Example: rg "SeBackupPrivilege" ~/hacktricks You don’t want outdated techniques. Every month:
Update them with git pull before any engagement. Download a pre-generated HTML dump (some community builds exist) or generate your own: hacktricks offline
Introduction: Why Offline Matters In the world of cybersecurity, you will eventually find yourself in a situation with no internet: a restricted client environment, a soundproofed SCIF, a CTF server with no outbound traffic, or a compromised machine with a severed network route. Yet, that is precisely when you need reference material the most. Yet, that is precisely when you need reference
The day you need it, you will thank past you. Stay curious. Stay offline-ready. Stay offline-ready
# Using wget to mirror (Linux/macOS) wget --recursive --level=10 --page-requisites --html-extension \ --convert-links --domains book.hacktricks.xyz --no-parent \ https://book.hacktricks.xyz/ Method 3: Docker / PDF Export # Run a local wiki container (if you have the image) docker run -p 8080:80 hacktricks/hacktricks Or convert Markdown to PDF (pandoc) pandoc hacktricks/README.md -o hacktricks.pdf Critical Offline-Only Workflows 1. Offline Reverse Shell One-Liner Search cd hacktricks grep -r "bash -i >& /dev/tcp" . Result: instantly get the exact IP/port syntax without Googling. 2. Privilege Escalation Checklist (Linux) Open locally: hacktricks/linux-hardening/linux-privilege-escalation-checklist.md
Subscribe now to keep reading and get access to the full archive.