Below is the list of filters:
You’ve found the SSH service open and need to know what you can do with it.
You’ve found the SMB service open and need to know what you can do with it.
You’ve found the Windows Management Intstrumentation (WMI) service open and need to know what you can do with it.
You’ve found the DCOM service open and need to know what you can do with it.
You’ve found the kerberos service open and need to know what you can do with it.
You’ve found the RPC service open and need to know what you can do with it.
You’ve found the LDAP service open and need to know what you can do with it.
Command relates to the NTLM protocol.
Command relates to the HTTP protocol
Command relates to the HTTPS protocol
Command relates to the SMTP protocol
Command relates to the SMTPS protocol
Command focuses on system administration
Command focuses on information gathering.
Command focuses on host enumeration.
Command focuses on exploitation.
Command focuses on persistence.
Command focuses on privilege escalation.
Command focuses on Reverse Shell.
Command focuses on Brute-Force/Dictionary attacks.
Command focuses on Social Engineering.
Command focuses on Buffer Overflows.
Command focuses on Reverse Engineering
Networking related command.
Web application related command.
Local machine related command.
Docker related command.
Virtual Machine related command.
Command is targeting Linux.
Command is targeting Linux.
Command is targeting Windows.
Command can be run on Linux.
Command can be run on MacOS.
Command can be run on Windows.