Cheatsheets

Quick reference guides for common penetration testing techniques.

Cheatsheet Topic
Active Directory AD attack methodology and commands
Web Application Web exploitation techniques and payloads
Linux Privesc Linux privilege escalation vectors
Windows Privesc Windows privilege escalation vectors
Reverse Shells Reverse shell one-liners for all languages
File Transfers Methods to transfer files between machines
Pivoting SSH tunneling, Chisel, Ligolo, SOCKS
Password Attacks Cracking, spraying, brute-forcing
Linux Enumeration Post-exploitation Linux enumeration
Windows Enumeration Post-exploitation Windows enumeration

Table of contents