List of Cheat Sheets

  1. Penetration Testing Tools Cheat Sheet
  2. Pentest Book
  3. pentestmonkey
  4. HAUSEC
  5. penetration-testing-cheat-sheet
  6. Penetration Testing Cheat Sheet
  7. Windows Privilege Escalation Fundamentals
  8. Basic Linux Privilege Escalation
  9. Active Directory Kill Chain Attack & Defense
  10. Windows & Active Directory Exploitation Cheat Sheet and Command Reference

PowerShell models Exploitation

  1. Invoke-Obfuscation
  2. PowerSploit
  3. Get-HttpStatus
  4. Posh-SecMod
  5. Nishang

Linux Privilege Escalation

  1. LinuxPrivChecker
  2. Unix privesc check
  3. mimipenguin

Local UNIX PrivEsc Aggregation FuzzySecurity

Reverse Shell

  1. pentestmonkey
  2. highon.coffee

Kernel Exploit

  1. kernelpop
  2. linux-kernel-exploits
  3. kernel-exploits

Post Exploitation

  1. Windows Post-Exploitation Command List
  2. Linux/Unix/BSD Post-Exploitation Command List
  3. OSX Post-Exploitation
  4. Metasploit Post Exploitation Command List
  5. Post Exploitation Wiki
  6. warri0r_

DNS Enumeration

nslookup and dig Command

nslookup dig
nslookup target.com dig target.com +short
nslookup type= PTR target.com dig target.com PTR
nslookup type= MX target.com dig target.com MX
nslookup type= NS target.com dig target.com NS
nslookup > server target.com > ls d target.com dig axfr @target.com target .com

free DNS service

Check your puplic IP

Free Private Proxy Browser

hide.me

Online database of proxy lists

proxy-list

anonymity testing sites

  1. centralops.net
  2. nmonitoring.com
  3. pentest-tools.com
  4. do-know.com
  5. all-nettools

Exploit Apache Tomcat

  1. Laudanum

MimiPenguin works similarly to the well known “mimikatz”

  1. MimiPenguin