# Misc Items

- [Powershell commands](/cyberwolf-security/misc/misc-items/powershell-commands.md): https://www.infosecmatter.com/powershell-commands-for-pentesters/
- [Reverse Shells](/cyberwolf-security/misc/misc-items/reverse-shells.md)
- [Web Shells](/cyberwolf-security/misc/misc-items/web-shells.md)
- [File Sharing](/cyberwolf-security/misc/misc-items/file-sharing.md)
- [Useful Commands](/cyberwolf-security/misc/misc-items/useful-commands.md)
- [Google Dorks](/cyberwolf-security/misc/misc-items/google-dorks.md)
- [Proxy & Proxy Chains](/cyberwolf-security/misc/misc-items/proxy-chains.md)
- [Port Scanning](/cyberwolf-security/misc/misc-items/port-scanning.md)
- [Intercept Linux CLI Traffic](/cyberwolf-security/misc/misc-items/intercept-linux-cli-traffic.md)
- [Nessus](/cyberwolf-security/misc/misc-items/nessus.md)
