# Boxes Methodology

- [Standalone Methodology](/security-stuff/boxes-methodology/standalone-methodology.md): (In-Progress) Workflow
- [Checklist](/security-stuff/boxes-methodology/standalone-methodology/checklist.md)
- [Web Application Methodology](/security-stuff/boxes-methodology/web-application-methodology.md)
- [Web Scanning](/security-stuff/boxes-methodology/web-application-methodology/web-scanning.md)
- [CMS](/security-stuff/boxes-methodology/web-application-methodology/cms.md)
- [Directory/VHost Enumeration](/security-stuff/boxes-methodology/web-application-methodology/directory-vhost-enumeration.md)
- [File Upload Vulnerability](/security-stuff/boxes-methodology/web-application-methodology/file-upload-vulnerability.md)
- [Bypass file upload filtering](/security-stuff/boxes-methodology/web-application-methodology/file-upload-vulnerability/bypass-file-upload-filtering.md)
- [Bruteforcing extensions](/security-stuff/boxes-methodology/web-application-methodology/file-upload-vulnerability/bruteforcing-extensions.md)
- [WebDAV](/security-stuff/boxes-methodology/web-application-methodology/file-upload-vulnerability/webdav.md)
- [Brute Forcing Authentication](/security-stuff/boxes-methodology/web-application-methodology/brute-forcing-authentication.md)
- [LFI/RFI Vulnerabilities](/security-stuff/boxes-methodology/web-application-methodology/lfi-rfi-vulnerabilities.md)
- [SQLi Vulnerabilities](/security-stuff/boxes-methodology/web-application-methodology/sqli-vulnerabilities.md)
- [Password Attacks Methodology](/security-stuff/boxes-methodology/password-attacks-methodology.md)
- [Brute-force service password](/security-stuff/boxes-methodology/password-attacks-methodology/brute-force-service-password.md)
- [Password Cracking](/security-stuff/boxes-methodology/password-attacks-methodology/password-cracking.md)
- [Custom Wordlist](/security-stuff/boxes-methodology/password-attacks-methodology/custom-wordlist.md)
- [AD Methodology](/security-stuff/boxes-methodology/ad-methodology.md): Workflow to Follow for AD.
- [Cheatsheet](/security-stuff/boxes-methodology/ad-methodology/cheatsheet.md)
- [Windows PE Methodology](/security-stuff/boxes-methodology/windows-pe-methodology.md)
- [Checklist](/security-stuff/boxes-methodology/windows-pe-methodology/checklist.md)
- [Linux PE Methodology](/security-stuff/boxes-methodology/linux-pe-methodology.md)
- [Checklist](/security-stuff/boxes-methodology/linux-pe-methodology/checklist.md)
- [Port Forwarding Techniques](/security-stuff/boxes-methodology/port-forwarding-techniques.md): Some Port Forwarding learnt from OSCP
- [Tunnel techniques](/security-stuff/boxes-methodology/tunnel-techniques.md)
- [Reverse Shell Payloads](/security-stuff/boxes-methodology/reverse-shell-payloads.md)
- [Upgrading Shells](/security-stuff/boxes-methodology/reverse-shell-payloads/upgrading-shells.md)
