mirror of
https://github.com/LasCC/HackTools.git
synced 2025-09-06 23:41:03 +00:00
Change divider orientation to center
This commit is contained in:
@@ -115,7 +115,7 @@ export default function LinuxCommands() {
|
||||
Useful Linux command for your Penetration Testing
|
||||
</Title>
|
||||
<Paragraph style={{ margin: 15 }}>List of useful commands on Linux</Paragraph>
|
||||
<Divider orientation='left'>SUID Commands</Divider>
|
||||
<Divider orientation='center'>SUID Commands</Divider>
|
||||
<div
|
||||
key='a'
|
||||
style={{
|
||||
@@ -130,7 +130,7 @@ export default function LinuxCommands() {
|
||||
);
|
||||
})}
|
||||
</div>
|
||||
<Divider orientation='left'>What version of the system ?</Divider>
|
||||
<Divider orientation='center'>What version of the system ?</Divider>
|
||||
<div
|
||||
key='b'
|
||||
style={{
|
||||
@@ -145,7 +145,7 @@ export default function LinuxCommands() {
|
||||
);
|
||||
})}
|
||||
</div>
|
||||
<Divider orientation='left'>What is its kernel version ?</Divider>
|
||||
<Divider orientation='center'>What is its kernel version ?</Divider>
|
||||
<div
|
||||
key='c'
|
||||
style={{
|
||||
@@ -160,7 +160,7 @@ export default function LinuxCommands() {
|
||||
);
|
||||
})}
|
||||
</div>
|
||||
<Divider orientation='left'>What is the environment variables ?</Divider>
|
||||
<Divider orientation='center'>What is the environment variables ?</Divider>
|
||||
<div
|
||||
key='d'
|
||||
style={{
|
||||
@@ -175,7 +175,7 @@ export default function LinuxCommands() {
|
||||
);
|
||||
})}
|
||||
</div>
|
||||
<Divider orientation='left'>Service settings, there is any wrong allocation?</Divider>
|
||||
<Divider orientation='center'>Service settings, there is any wrong allocation?</Divider>
|
||||
<div
|
||||
key='e'
|
||||
style={{
|
||||
@@ -190,7 +190,7 @@ export default function LinuxCommands() {
|
||||
);
|
||||
})}
|
||||
</div>
|
||||
<Divider orientation='left'>Is there any cron jobs ?</Divider>
|
||||
<Divider orientation='center'>Is there any cron jobs ?</Divider>
|
||||
<div
|
||||
key='f'
|
||||
style={{
|
||||
@@ -205,7 +205,7 @@ export default function LinuxCommands() {
|
||||
);
|
||||
})}
|
||||
</div>
|
||||
<Divider orientation='left'>Other users host communication with the system ?</Divider>
|
||||
<Divider orientation='center'>Other users host communication with the system ?</Divider>
|
||||
<div
|
||||
key='g'
|
||||
style={{
|
||||
@@ -220,7 +220,7 @@ export default function LinuxCommands() {
|
||||
);
|
||||
})}
|
||||
</div>
|
||||
<Divider orientation='left'>How to port forward ?</Divider>
|
||||
<Divider orientation='center'>How to port forward ?</Divider>
|
||||
<div
|
||||
key='h'
|
||||
style={{
|
||||
@@ -235,7 +235,7 @@ export default function LinuxCommands() {
|
||||
);
|
||||
})}
|
||||
</div>
|
||||
<Divider orientation='left'>TAR wildcard cronjob privilege escalation</Divider>
|
||||
<Divider orientation='center'>TAR wildcard cronjob privilege escalation</Divider>
|
||||
<div
|
||||
key='h'
|
||||
style={{
|
||||
|
@@ -27,7 +27,7 @@ export default function TTY() {
|
||||
python -c 'import pty; pty.spawn("/bin/bash")'
|
||||
</Paragraph>
|
||||
</div>
|
||||
<Divider orientation='left'>Fully Interactive TTY</Divider>
|
||||
<Divider orientation='center'>Fully Interactive TTY</Divider>
|
||||
<div
|
||||
key='b'
|
||||
style={{
|
||||
|
@@ -221,7 +221,7 @@ export default function PhpReverseShell() {
|
||||
</Col>
|
||||
</Row>
|
||||
</div>
|
||||
<Divider orientation='left'>Pentestmonkey's reverse shell</Divider>
|
||||
<Divider orientation='center'>Pentestmonkey's reverse shell</Divider>
|
||||
<div
|
||||
key='a'
|
||||
style={{
|
||||
|
@@ -80,7 +80,7 @@ export default function XSS() {
|
||||
Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses
|
||||
input from a user within the output it generates without validating or encoding it.
|
||||
</Paragraph>
|
||||
<Divider orientation='left'>Data grabber for XSS</Divider>
|
||||
<Divider orientation='center'>Data grabber for XSS</Divider>
|
||||
<div
|
||||
key='a'
|
||||
style={{
|
||||
@@ -99,7 +99,7 @@ export default function XSS() {
|
||||
);
|
||||
})}
|
||||
</div>
|
||||
<Divider orientation='left'>XSS in HTML/Applications</Divider>
|
||||
<Divider orientation='center'>XSS in HTML/Applications</Divider>
|
||||
<div
|
||||
key='b'
|
||||
style={{
|
||||
@@ -121,7 +121,7 @@ export default function XSS() {
|
||||
);
|
||||
})}
|
||||
</div>
|
||||
<Divider orientation='left'>XSS in Markdown</Divider>
|
||||
<Divider orientation='center'>XSS in Markdown</Divider>
|
||||
<div
|
||||
key='c'
|
||||
style={{
|
||||
@@ -136,7 +136,7 @@ export default function XSS() {
|
||||
);
|
||||
})}
|
||||
</div>
|
||||
<Divider orientation='left'>XSS in SVG (short)</Divider>
|
||||
<Divider orientation='center'>XSS in SVG (short)</Divider>
|
||||
<div
|
||||
key='d'
|
||||
style={{
|
||||
@@ -151,7 +151,7 @@ export default function XSS() {
|
||||
);
|
||||
})}
|
||||
</div>
|
||||
<Divider orientation='left'>Bypass word blacklist with code evaluation</Divider>
|
||||
<Divider orientation='center'>Bypass word blacklist with code evaluation</Divider>
|
||||
<div
|
||||
key='e'
|
||||
style={{
|
||||
|
Reference in New Issue
Block a user