Tools
Last updated
Last updated
: Target Selection and API Usage.
This explains each of the edges in-depth and provides abuse info for how each one can be leverage to further our rights and access as well as opsec considerations regarding the types of artifacts that may be generated by a specific attack or ways that the attack may be detected by security monitoring personnel.
info on all the various switches, check this by @CptJesus
locate neo4j | grep auth
then delete /usr/share/neo4j/data/dbms/auth
A Cypher reference card showing commands and their syntax can be found .
THE DOG WHISPERER'S .