Cheatsheets
Quick reference guides for common penetration testing techniques.
| Cheatsheet | Topic |
|---|---|
| Active Directory | AD attack methodology and commands |
| Web Application | Web exploitation techniques and payloads |
| Linux Privesc | Linux privilege escalation vectors |
| Windows Privesc | Windows privilege escalation vectors |
| Reverse Shells | Reverse shell one-liners for all languages |
| File Transfers | Methods to transfer files between machines |
| Pivoting | SSH tunneling, Chisel, Ligolo, SOCKS |
| Password Attacks | Cracking, spraying, brute-forcing |
| Linux Enumeration | Post-exploitation Linux enumeration |
| Windows Enumeration | Post-exploitation Windows enumeration |