diff --git a/forensics/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md b/forensics/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md
index ef5ad9ce6..62e238642 100644
--- a/forensics/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md
+++ b/forensics/basic-forensic-methodology/partitions-file-systems-carving/file-data-carving-recovery-tools.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -114,7 +114,7 @@ You can use the linux command line tool **pdftotext** to transform a pdf into te
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/generic-methodologies-and-resources/exfiltration.md b/generic-methodologies-and-resources/exfiltration.md
index 9051fe136..e1f2fd31a 100644
--- a/generic-methodologies-and-resources/exfiltration.md
+++ b/generic-methodologies-and-resources/exfiltration.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -386,7 +386,7 @@ Then copy-paste the text into the windows-shell and a file called nc.exe will be
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/generic-methodologies-and-resources/external-recon-methodology/wide-source-code-search.md b/generic-methodologies-and-resources/external-recon-methodology/wide-source-code-search.md
index 7f80ae2d4..37f7de065 100644
--- a/generic-methodologies-and-resources/external-recon-methodology/wide-source-code-search.md
+++ b/generic-methodologies-and-resources/external-recon-methodology/wide-source-code-search.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -38,7 +38,7 @@ When you look for leaks in a repo and run something like `git log -p` don't forg
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md b/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md
index 442eed46f..53ee132b9 100644
--- a/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md
+++ b/generic-methodologies-and-resources/python/bypass-python-sandboxes/README.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -1127,7 +1127,7 @@ will be bypassed
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/generic-methodologies-and-resources/shells/linux.md b/generic-methodologies-and-resources/shells/linux.md
index 03caeb114..7f38e3c8f 100644
--- a/generic-methodologies-and-resources/shells/linux.md
+++ b/generic-methodologies-and-resources/shells/linux.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -400,7 +400,7 @@ Process p=new ProcessBuilder(cmd).redirectErrorStream(true).start();Socket s=new
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/generic-methodologies-and-resources/shells/windows.md b/generic-methodologies-and-resources/shells/windows.md
index aa2297346..ae9be4d66 100644
--- a/generic-methodologies-and-resources/shells/windows.md
+++ b/generic-methodologies-and-resources/shells/windows.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -572,7 +572,7 @@ WinPWN](https://github.com/SecureThisShit/WinPwn) PS console with some offensive
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/generic-methodologies-and-resources/tunneling-and-port-forwarding.md b/generic-methodologies-and-resources/tunneling-and-port-forwarding.md
index f92548b30..5837ef273 100644
--- a/generic-methodologies-and-resources/tunneling-and-port-forwarding.md
+++ b/generic-methodologies-and-resources/tunneling-and-port-forwarding.md
@@ -14,7 +14,7 @@
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -621,7 +621,7 @@ tunnels:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/linux-hardening/linux-environment-variables.md b/linux-hardening/linux-environment-variables.md
index df5f54685..ed3c56319 100644
--- a/linux-hardening/linux-environment-variables.md
+++ b/linux-hardening/linux-environment-variables.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -143,7 +143,7 @@ One background job, one stopped and last command didn't finish correctly:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/mobile-pentesting/android-app-pentesting/android-applications-basics.md b/mobile-pentesting/android-app-pentesting/android-applications-basics.md
index 18e98dc72..2f61a205a 100644
--- a/mobile-pentesting/android-app-pentesting/android-applications-basics.md
+++ b/mobile-pentesting/android-app-pentesting/android-applications-basics.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -417,7 +417,7 @@ if (dpm.isAdminActive(adminComponent)) {
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/mobile-pentesting/android-app-pentesting/android-task-hijacking.md b/mobile-pentesting/android-app-pentesting/android-task-hijacking.md
index 6e807fe8d..2bf5e7e91 100644
--- a/mobile-pentesting/android-app-pentesting/android-task-hijacking.md
+++ b/mobile-pentesting/android-app-pentesting/android-task-hijacking.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -66,7 +66,7 @@ To prevent such attacks, developers can set `taskAffinity` to an empty string an
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/mobile-pentesting/android-app-pentesting/make-apk-accept-ca-certificate.md b/mobile-pentesting/android-app-pentesting/make-apk-accept-ca-certificate.md
index 5e4820e8b..0d25587fd 100644
--- a/mobile-pentesting/android-app-pentesting/make-apk-accept-ca-certificate.md
+++ b/mobile-pentesting/android-app-pentesting/make-apk-accept-ca-certificate.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -71,7 +71,7 @@ Finally, you need just to **sign the new application**. [Read this section of th
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/mobile-pentesting/android-checklist.md b/mobile-pentesting/android-checklist.md
index 791130ff5..8c89c8517 100644
--- a/mobile-pentesting/android-checklist.md
+++ b/mobile-pentesting/android-checklist.md
@@ -14,7 +14,7 @@
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -77,7 +77,7 @@
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/mobile-pentesting/ios-pentesting-checklist.md b/mobile-pentesting/ios-pentesting-checklist.md
index b22199582..b6413bd9b 100644
--- a/mobile-pentesting/ios-pentesting-checklist.md
+++ b/mobile-pentesting/ios-pentesting-checklist.md
@@ -24,7 +24,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -120,7 +120,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/network-services-pentesting/43-pentesting-whois.md b/network-services-pentesting/43-pentesting-whois.md
index 82582673b..ebf909d07 100644
--- a/network-services-pentesting/43-pentesting-whois.md
+++ b/network-services-pentesting/43-pentesting-whois.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -54,7 +54,7 @@ Also, the WHOIS service always needs to use a **database** to store and extract
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/network-services-pentesting/49-pentesting-tacacs+.md b/network-services-pentesting/49-pentesting-tacacs+.md
index b6f274c9d..14cf1939d 100644
--- a/network-services-pentesting/49-pentesting-tacacs+.md
+++ b/network-services-pentesting/49-pentesting-tacacs+.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -62,7 +62,7 @@ By gaining access to the control panel of network equipment using the obtained c
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/network-services-pentesting/7-tcp-udp-pentesting-echo.md b/network-services-pentesting/7-tcp-udp-pentesting-echo.md
index d9925968e..01a29b2ac 100644
--- a/network-services-pentesting/7-tcp-udp-pentesting-echo.md
+++ b/network-services-pentesting/7-tcp-udp-pentesting-echo.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -58,7 +58,7 @@ Hello echo #This is the response
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/network-services-pentesting/ipsec-ike-vpn-pentesting.md b/network-services-pentesting/ipsec-ike-vpn-pentesting.md
index be22f326f..d30114796 100644
--- a/network-services-pentesting/ipsec-ike-vpn-pentesting.md
+++ b/network-services-pentesting/ipsec-ike-vpn-pentesting.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -292,7 +292,7 @@ Ensure that actual, secure values are used to replace the placeholders when conf
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/network-services-pentesting/pentesting-ftp/README.md b/network-services-pentesting/pentesting-ftp/README.md
index 7436db2e4..3988e4f61 100644
--- a/network-services-pentesting/pentesting-ftp/README.md
+++ b/network-services-pentesting/pentesting-ftp/README.md
@@ -14,7 +14,7 @@
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -247,7 +247,7 @@ The default configuration of vsFTPd can be found in `/etc/vsftpd.conf`. In here,
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/network-services-pentesting/pentesting-ftp/ftp-bounce-attack.md b/network-services-pentesting/pentesting-ftp/ftp-bounce-attack.md
index 3746b725c..6546669a4 100644
--- a/network-services-pentesting/pentesting-ftp/ftp-bounce-attack.md
+++ b/network-services-pentesting/pentesting-ftp/ftp-bounce-attack.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -56,7 +56,7 @@ nmap -v -p 21,22,445,80,443 -b ftp:ftp@10.2.1.5 192.168.0.1/24 #Scan the interna
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/network-services-pentesting/pentesting-imap.md b/network-services-pentesting/pentesting-imap.md
index 3dc0ab0bc..046f98930 100644
--- a/network-services-pentesting/pentesting-imap.md
+++ b/network-services-pentesting/pentesting-imap.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -182,7 +182,7 @@ done
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/network-services-pentesting/pentesting-mssql-microsoft-sql-server/README.md b/network-services-pentesting/pentesting-mssql-microsoft-sql-server/README.md
index 4c69adca8..1e94c03f0 100644
--- a/network-services-pentesting/pentesting-mssql-microsoft-sql-server/README.md
+++ b/network-services-pentesting/pentesting-mssql-microsoft-sql-server/README.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -541,7 +541,7 @@ You probably will be able to **escalate to Administrator** following one of thes
* [https://blog.waynesheffield.com/wayne/archive/2017/08/working-registry-sql-server/](https://blog.waynesheffield.com/wayne/archive/2017/08/working-registry-sql-server/)
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/network-services-pentesting/pentesting-pop.md b/network-services-pentesting/pentesting-pop.md
index c8af53f60..64da393df 100644
--- a/network-services-pentesting/pentesting-pop.md
+++ b/network-services-pentesting/pentesting-pop.md
@@ -14,7 +14,7 @@
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -113,7 +113,7 @@ From [https://academy.hackthebox.com/module/112/section/1073](https://academy.ha
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/network-services-pentesting/pentesting-smb/rpcclient-enumeration.md b/network-services-pentesting/pentesting-smb/rpcclient-enumeration.md
index 5397c0042..3769332bd 100644
--- a/network-services-pentesting/pentesting-smb/rpcclient-enumeration.md
+++ b/network-services-pentesting/pentesting-smb/rpcclient-enumeration.md
@@ -14,7 +14,7 @@
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -105,7 +105,7 @@ To **understand** better how the tools _**samrdump**_ **and** _**rpcdump**_ work
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/network-services-pentesting/pentesting-web/php-tricks-esp/php-ssrf.md b/network-services-pentesting/pentesting-web/php-tricks-esp/php-ssrf.md
index 801248888..c741041e2 100644
--- a/network-services-pentesting/pentesting-web/php-tricks-esp/php-ssrf.md
+++ b/network-services-pentesting/pentesting-web/php-tricks-esp/php-ssrf.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -76,7 +76,7 @@ $file = file_get_contents($url, false, $context);
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/network-services-pentesting/pentesting-web/tomcat.md b/network-services-pentesting/pentesting-web/tomcat.md
index 837250b0e..794ea0235 100644
--- a/network-services-pentesting/pentesting-web/tomcat.md
+++ b/network-services-pentesting/pentesting-web/tomcat.md
@@ -14,7 +14,7 @@
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -268,7 +268,7 @@ msf> use post/windows/gather/enum_tomcat
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/network-services-pentesting/pentesting-web/tomcat/basic-tomcat-info.md b/network-services-pentesting/pentesting-web/tomcat/basic-tomcat-info.md
index 74a5e56fd..a17b660f7 100644
--- a/network-services-pentesting/pentesting-web/tomcat/basic-tomcat-info.md
+++ b/network-services-pentesting/pentesting-web/tomcat/basic-tomcat-info.md
@@ -14,7 +14,7 @@
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -159,7 +159,7 @@ The file shows us what each of the roles `manager-gui`, `manager-script`, `manag
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/pentesting-web/bypass-payment-process.md b/pentesting-web/bypass-payment-process.md
index 056d08ac4..cc114b36a 100644
--- a/pentesting-web/bypass-payment-process.md
+++ b/pentesting-web/bypass-payment-process.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -54,7 +54,7 @@ If you encounter a parameter that contains a URL, especially one following the p
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md b/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md
index a910c3341..2d39770d8 100644
--- a/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md
+++ b/pentesting-web/formula-csv-doc-latex-ghostscript-injection.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -219,7 +219,7 @@ From [@EdOverflow](https://twitter.com/intigriti/status/1101509684614320130)
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/pentesting-web/h2c-smuggling.md b/pentesting-web/h2c-smuggling.md
index 7421fc087..4d2d70c0f 100644
--- a/pentesting-web/h2c-smuggling.md
+++ b/pentesting-web/h2c-smuggling.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -115,7 +115,7 @@ Check the labs to test both scenarios in [https://github.com/0ang3el/websocket-s
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/pentesting-web/hacking-with-cookies/README.md b/pentesting-web/hacking-with-cookies/README.md
index 78146af9c..a3e114ffa 100644
--- a/pentesting-web/hacking-with-cookies/README.md
+++ b/pentesting-web/hacking-with-cookies/README.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -283,7 +283,7 @@ There should be a pattern (with the size of a used block). So, knowing how are a
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.md b/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.md
index 0ac4a1316..7ee4f2f97 100644
--- a/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.md
+++ b/pentesting-web/ssrf-server-side-request-forgery/cloud-ssrf.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -590,7 +590,7 @@ Rancher's metadata can be accessed using:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/pentesting-web/ssrf-server-side-request-forgery/url-format-bypass.md b/pentesting-web/ssrf-server-side-request-forgery/url-format-bypass.md
index 8cde1c3c7..9b9cb3719 100644
--- a/pentesting-web/ssrf-server-side-request-forgery/url-format-bypass.md
+++ b/pentesting-web/ssrf-server-side-request-forgery/url-format-bypass.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -227,7 +227,7 @@ image from [https://claroty.com/2022/01/10/blog-research-exploiting-url-parsing-
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/pentesting-web/xs-search/css-injection/README.md b/pentesting-web/xs-search/css-injection/README.md
index cc95934b7..faef680b0 100644
--- a/pentesting-web/xs-search/css-injection/README.md
+++ b/pentesting-web/xs-search/css-injection/README.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -491,7 +491,7 @@ So, if the font does not match, the response time when visiting the bot is expec
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/pentesting-web/xss-cross-site-scripting/abusing-service-workers.md b/pentesting-web/xss-cross-site-scripting/abusing-service-workers.md
index d8555e35f..3a4288099 100644
--- a/pentesting-web/xss-cross-site-scripting/abusing-service-workers.md
+++ b/pentesting-web/xss-cross-site-scripting/abusing-service-workers.md
@@ -16,7 +16,7 @@
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -125,7 +125,7 @@ For an example of this check the reference link.
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/reversing/common-api-used-in-malware.md b/reversing/common-api-used-in-malware.md
index d55280618..8d15b52ed 100644
--- a/reversing/common-api-used-in-malware.md
+++ b/reversing/common-api-used-in-malware.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -158,7 +158,7 @@ The malware will unmap the legitimate code from memory of the process and load a
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/reversing/reversing-tools-basic-methods/README.md b/reversing/reversing-tools-basic-methods/README.md
index 3fc30fe42..c28da46ca 100644
--- a/reversing/reversing-tools-basic-methods/README.md
+++ b/reversing/reversing-tools-basic-methods/README.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -427,7 +427,7 @@ So, in this challenge, knowing the values of the buttons, you needed to **press
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/stego/stego-tricks.md b/stego/stego-tricks.md
index f7fe3b2b8..8dc6bb69b 100644
--- a/stego/stego-tricks.md
+++ b/stego/stego-tricks.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -239,7 +239,7 @@ For translating Braille, the [Branah Braille Translator](https://www.branah.com/
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/todo/radio-hacking/flipper-zero/README.md b/todo/radio-hacking/flipper-zero/README.md
index 40384ae9f..723f7d985 100644
--- a/todo/radio-hacking/flipper-zero/README.md
+++ b/todo/radio-hacking/flipper-zero/README.md
@@ -14,7 +14,7 @@
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -35,7 +35,7 @@ With [**Flipper Zero**](https://flipperzero.one/) you can:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/todo/radio-hacking/flipper-zero/fz-sub-ghz.md b/todo/radio-hacking/flipper-zero/fz-sub-ghz.md
index 5fc668863..3c38c4c30 100644
--- a/todo/radio-hacking/flipper-zero/fz-sub-ghz.md
+++ b/todo/radio-hacking/flipper-zero/fz-sub-ghz.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -129,7 +129,7 @@ Get dBms of the saved frequencies
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/todo/radio-hacking/proxmark-3.md b/todo/radio-hacking/proxmark-3.md
index 4f1a34a17..d1f041114 100644
--- a/todo/radio-hacking/proxmark-3.md
+++ b/todo/radio-hacking/proxmark-3.md
@@ -14,7 +14,7 @@
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -81,7 +81,7 @@ You can create a script to **fuzz tag readers**, so copying the data of a **vali
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/windows-hardening/checklist-windows-privilege-escalation.md b/windows-hardening/checklist-windows-privilege-escalation.md
index b04e6a603..5c82ebb32 100644
--- a/windows-hardening/checklist-windows-privilege-escalation.md
+++ b/windows-hardening/checklist-windows-privilege-escalation.md
@@ -16,7 +16,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -133,7 +133,7 @@ Other ways to support HackTricks:
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
diff --git a/windows-hardening/lateral-movement/dcom-exec.md b/windows-hardening/lateral-movement/dcom-exec.md
index adc4c96b4..b5ec59fea 100644
--- a/windows-hardening/lateral-movement/dcom-exec.md
+++ b/windows-hardening/lateral-movement/dcom-exec.md
@@ -14,7 +14,7 @@
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}
@@ -136,7 +136,7 @@ SharpLateral.exe reddcom HOSTNAME C:\Users\Administrator\Desktop\malware.exe
**Try Hard Security Group**
-
+
{% embed url="https://discord.gg/tryhardsecurity" %}