# Using wget to mirror (Linux/macOS) wget --recursive --level=10 --page-requisites --html-extension \ --convert-links --domains book.hacktricks.xyz --no-parent \ https://book.hacktricks.xyz/ Method 3: Docker / PDF Export # Run a local wiki container (if you have the image) docker run -p 8080:80 hacktricks/hacktricks Or convert Markdown to PDF (pandoc) pandoc hacktricks/README.md -o hacktricks.pdf Critical Offline-Only Workflows 1. Offline Reverse Shell One-Liner Search cd hacktricks grep -r "bash -i >& /dev/tcp" . Result: instantly get the exact IP/port syntax without Googling. 2. Privilege Escalation Checklist (Linux) Open locally: hacktricks/linux-hardening/linux-privilege-escalation-checklist.md
# Python 3 HTTP server python3 -m http.server 8000 nc -lvp 4444 < file_to_send nc target 4444 > received_file Base64 encoding base64 -w0 payload.exe; echo Offline Tools to Pair with HackTricks | Tool | Purpose | | --- | --- | | grep , ripgrep (rg) | Ultra-fast search through markdown files | | fzf | Fuzzy finding over all headings | | obsidian / logseq | Local markdown knowledge base with backlinks | | cheat | Custom cheat sheets – import HackTricks snippets |
— Your local /etc/hosts
(by Carlos Polop) is the industry’s go-to crowdsourced repository of enumeration, privilege escalation, persistence, and exploitation techniques. But the online version is useless when you are inside an isolated network.
The day you need it, you will thank past you. Stay curious. Stay offline-ready. hacktricks offline
Example: rg "SeBackupPrivilege" ~/hacktricks You don’t want outdated techniques. Every month:
Update them with git pull before any engagement. Download a pre-generated HTML dump (some community builds exist) or generate your own: # Using wget to mirror (Linux/macOS) wget --recursive
Introduction: Why Offline Matters In the world of cybersecurity, you will eventually find yourself in a situation with no internet: a restricted client environment, a soundproofed SCIF, a CTF server with no outbound traffic, or a compromised machine with a severed network route. Yet, that is precisely when you need reference material the most.