awesome-pentest-cheat-sheets
Pentest resource
A collection of cheat sheets and check lists useful for security testing and penetration
Collection of cheat sheets useful for pentesting
373 stars
4 watching
21 forks
last commit: over 1 year ago
Linked from 2 awesome lists
cheat-sheetcheat-sheet-pentestpenetration-testingpenetration-testing-toolspentestpentest-cheat-sheetspentestingpentesting-resources
Awesome Pentest Cheat Sheets / Security Talks and Videos | |||
| Cybersecurity Conference Directory | All Cybersecurity, InfoSec & IT Conferences and Events | ||
| Confsec | 501 | about 1 year ago | List of Security Events 2024 |
| InfoCon | The Hacking Conference Archive | ||
| Awesome Security Talks | 4,061 | over 4 years ago | Curated list of Security Talks and Videos |
Awesome Pentest Cheat Sheets / General cheat sheets | |||
| The Hackers' Choice Tips & Tricks Cheatsheet | 3,175 | 11 months ago | |
| Docker Cheat Sheet | 22,162 | over 1 year ago | |
| macOS Command Line Cheat Sheet | 29,026 | about 4 years ago | |
| PowerShell Cheat Sheet | SANS PowerShell Cheat Sheet from SEC560 Course | ||
| Rawsec's CyberSecurity Inventory | An open-source inventory of tools, resources, CTF platforms and Operating Systems about CyberSecurity. ( ) | ||
| Regexp Security Cheat Sheet | 707 | about 3 years ago | |
| Security Cheat Sheets | 22 | almost 9 years ago | A collection of security cheat sheets |
| Unix Commands Cheat Sheet | |||
| Linux File Permissions Cheat Sheet | |||
| DostoevskyLabs' Pentest notes | Pentest Notes collection from DostoevskyLabs | ||
| Thick Client Pentest Checklist | 136 | about 3 years ago | Pentest Checklist for Thick-Client Penetration Tests |
| HauSec's Pentesting Cheat sheet | Pentest Cheat sheet from HauSec | ||
Awesome Pentest Cheat Sheets / Mobile Pentesting | |||
| Mobile App Pentest Cheat Sheet | 4,609 | over 1 year ago | Collection of resources on Apple & iOS Penetration Testing |
| Mobexler | Customised virtual machine, designed to help in penetration testing of Android & iOS applications | ||
Awesome Pentest Cheat Sheets / Mobile Pentesting / Android | |||
| Android Pentest Checklist Xmind | Xmind mindmap for Android Penetration Tests | ||
| MASTG | 11,816 | 11 months ago | OWASP Mobile Application Security Testing Guide |
| Android Pentesting Checklist | 194 | about 1 year ago | Case-by-case Checklist for Android Pentests |
| Android Pentesting Cheat sheet | 372 | 11 months ago | Android Pentesting Resources #1 |
| HackTricks - Android Pentesting | HackTricks Collection of Android Pentesting | ||
| InjuredAndroid | 670 | over 4 years ago | |
| Damn vulnerable Bank | 656 | almost 2 years ago | |
| InsecureShop | 234 | over 3 years ago | |
| AndroGoat | 217 | over 3 years ago | |
| Android-Insecurebankv2 | 1,268 | over 1 year ago | |
| OVAA | 662 | over 1 year ago | |
| DIVA | 974 | over 2 years ago | |
Awesome Pentest Cheat Sheets / Mobile Pentesting / Apple | |||
| iOS Pentest Checklist | 316 | over 1 year ago | Checklist for iOS/IPA Penetration Tests |
| Hacktricks iOS Checklist | Another Checklist for iOS/IPA Penetration Tests | Hacktricks Cloud | ||
| PentestGlobal IOS gitbook | Gitbook about iOS Pentesting | ||
| Can i jailbreak? | List of each jailbreak needed for each iOS version | ||
| Jailbreaks.app | Downloads for Odyssey, Taurine Jailbreaks | ||
Awesome Pentest Cheat Sheets / Cloud Pentesting / Kubernetes | |||
| Awesome Kubernetes (K8s) Security | 1,918 | about 2 years ago | Collection of Kubernetes security resources |
| Kubetools | Kubernetes security tools | ||
| HackingKubernetes | 100 | over 3 years ago | Collection of Kubernetes Pentesting Resources |
| Kubernetes Goat | 4,542 | 11 months ago | Vulnerable-by-Design cluster environment for training |
| KubePwn | 54 | almost 5 years ago | Another Collection of resources about Kubernetes security |
| HackTricks - Kubernetes Pentesting | HackTricks Collection of Kubernetes Pentesting | ||
| Part 1 | |||
| Part 2 | |||
| Part 3 | |||
Awesome Pentest Cheat Sheets / Cloud Pentesting / Azure | |||
| Awesome Azure Pentest | 1,027 | almost 2 years ago | A curated list of useful tools and resources for penetration testing and securing Microsofts cloud platform Azure |
| HackTricks - Azure Pentesting | HackTricks Collection of Kubernetes Pentesting | ||
Awesome Pentest Cheat Sheets / Active Directory | |||
| Active Directory Exploitation Cheat Sheet | 5,745 | about 1 year ago | Cheat sheet for Active Directory Exploitation |
| OSCP Active Directory Cheat Sheet | 140 | over 3 years ago | Cheat sheet for Active Directory Attacks used in OSCP |
| WADComs | Interactive cheat sheet - list of offensive security tools and their respective commands to be used against Windows/AD environments | ||
| HackTricks - Active Directory Pentesting | HackTricks Collection of Active Directory Pentesting | ||
| GOAD | 5,620 | 11 months ago | Vulnerable-by-Design Active Directory environment |
| Ultimate BloodHound Guide | The Ultimate Guide for BloodHound Community Edition (BHCE) | ||
| Windows Red Team Cheat sheet | 124 | over 3 years ago | Windows for Red Teamers Cheat Sheet ( ) |
| Resource Collection #1 | 30 | over 3 years ago | Collection of Active Directory Pentesting resources #1 |
| Resource Collection #2 | 16 | over 1 year ago | Collection of Active Directory Pentesting resources #2 |
| Resource Collection #3 | 156 | about 4 years ago | Collection of Active Directory Pentesting resources #3 |
| Resource Collection #4 | 2,499 | almost 3 years ago | Collection of Active Directory Pentesting resources #4 |
Awesome Pentest Cheat Sheets / Pentest Methodology / Discovery | |||
| Google Dorks | Google Dorks Hacking Database (Exploit-DB) | ||
| Shodan | 373 | over 1 year ago | Shodan is a search engine for finding specific devices, and device types, that exist online |
| ZoomEye | Zoomeye is a Cyberspace Search Engine recording information of devices, websites, services and components etc | ||
| Amass | 12,185 | 11 months ago | OWASP Network mapping of attack surfaces and external asset discovery using open source information |
| Censys | Similar to shodan, search engine for specific devices including IoT | ||
Awesome Pentest Cheat Sheets / Pentest Methodology / Enumeration | |||
| enum4linux-ng | 1,210 | over 1 year ago | Python tool for enumerating information from Windows/Samba systems |
| 0xdf - SMB Enumeration | 0xdf's SMB Enumeration Cheat Sheet | ||
| OSCP Enumeration Cheat sheet | 102 | over 4 years ago | Cheat sheet for Enumeration for OSCP Certificate |
| CrackMapExec Cheatsheet | Cheat sheet for CrackMapExec (CME) | ||
Awesome Pentest Cheat Sheets / Pentest Methodology / Exploitation | |||
| Empire Cheat Sheet | 1,044 | about 8 years ago | is a PowerShell and Python post-exploitation framework |
| Exploit Development Cheat Sheet | 373 | over 1 year ago | 's exploit development in one picture |
| Java Deserialization Cheat Sheet | 3,044 | over 2 years ago | A cheat sheet for pentesters about Java Native Binary Deserialization vulnerabilities |
| Local File Inclusion (LFI) Cheat Sheet #1 | Arr0way's LFI Cheat Sheet | ||
| Local File Inclusion (LFI) Cheat Sheet #2 | Aptive's LFI Cheat Sheet | ||
| Metasploit Unleashed | The ultimate guide to the Metasploit Framework | ||
| Metasploit Cheat Sheet | A quick reference guide | ||
| PowerSploit Cheat Sheet | 1,044 | about 8 years ago | is a powershell post-exploitation framework |
| PowerView 2.0 Tricks | |||
| PowerView 3.0 Tricks | |||
| PHP htaccess Injection Cheat Sheet | 816 | over 1 year ago | PHP htaccess Injection Cheat Sheet by PHP Secure Configuration Checker |
| Reverse Shell Cheat Sheet #1 | Pentestmonkey Reverse Shell Cheat Sheet | ||
| Reverse Shell Cheat Sheet #2 | Arr0way's Reverse Shell Cheat Sheet | ||
| SQL Injection Cheat Sheet | Netsparker's SQL Injection Cheat Sheet | ||
| SQLite3 Injection Cheat Sheet | |||
Awesome Pentest Cheat Sheets / Pentest Methodology / Post-Exploitation | |||
| Awesome Windows Post Exploitation | 528 | about 4 years ago | Collection of resources for Windows Post-Exploitation |
| HackTricks - Post Exploitation | HackTricks Collection of Post-Exploitation | ||
Awesome Pentest Cheat Sheets / Pentest Methodology / Privilege Escalation | |||
| Windows / Linux Local Privilege Escalation Workshop | 1,893 | about 3 years ago | The Privilege Escalation Workshop covers all known (at the time) attack vectors of local user privilege escalation on both Linux and Windows operating systems and includes slides, videos, test VMs |
| Basic Linux Privilege Escalation | Linux Privilege Escalation by | ||
| linux-exploit-suggester.sh | 5,702 | over 1 year ago | Linux privilege escalation auditing tool written in bash (updated) |
| Linux_Exploit_Suggester.pl | 1,779 | over 11 years ago | Linux Exploit Suggester written in Perl (last update 3 years ago) |
| Linux_Exploit_Suggester.pl v2 | 1,862 | almost 3 years ago | Next-generation exploit suggester based on Linux_Exploit_Suggester (updated) |
| Linux Soft Exploit Suggester | 222 | over 2 years ago | Linux-soft-exploit-suggester finds exploits for all vulnerable software in a system helping with the privilege escalation. It focuses on software packages instead of Kernel vulnerabilities |
| checksec.sh | 2,061 | 11 months ago | Bash script to check the properties of executables (like PIE, RELRO, PaX, Canaries, ASLR, Fortify Source) |
| linuxprivchecker.py | This script is intended to be executed locally on a Linux box to enumerate basic system info and search for common privilege escalation vectors such as world writable files, misconfigurations, clear-text passwords and applicable exploits (@SecuritySift) | ||
| LinEnum | 7,096 | about 2 years ago | This tool is great at running through a heap of things you should check on a Linux system in the post exploit process. This include file permissions, cron jobs if visible, weak credentials etc.(@Rebootuser) |
| linPEAS | 16,431 | 11 months ago | LinPEAS - Linux Privilege Escalation Awesome Script. Check the Local Linux Privilege Escalation checklist from |
| MimiPenguin | 3,844 | over 2 years ago | A tool to dump the login password from the current linux desktop user. Adapted from the idea behind the popular Windows tool mimikatz. |
| PowerUp | 11,979 | about 5 years ago | Excellent powershell script for checking of common Windows privilege escalation vectors. Written by |
| PowerUp Cheat Sheet | 1,044 | about 8 years ago | |
| Windows Exploit Suggester | 3,985 | over 2 years ago | Tool for detection of missing security patches on the windows operating system and mapping with the public available exploits |
| Sherlock | 1,901 | about 7 years ago | PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities |
| Watson | 1,558 | almost 5 years ago | Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities |
| Precompiled Windows Exploits | 1,837 | about 5 years ago | Collection of precompiled Windows exploits |
| Metasploit Modules | 34,393 | 11 months ago | |
Awesome Pentest Cheat Sheets / Web Pentesting | |||
| OWASP Web Security Testing Guide | |||
| Web Pentest Checklist | Checklist for Web Application Penetration Tests | ||
| SQL Injection Cheatsheet | PortSwigger SQL Injection Cheat Sheet | ||
| Cross-Site-Scripting Cheat sheet | PortSwigger Cross-Site-Scripting (XSS) Cheat sheet | ||
| Google CSP Evaluator | Google's CSP Evaluator | ||
| Awesome Web Hacking | 5,912 | 11 months ago | Collection of resources for Web Pentesting #1 |
| Awesome Web Security | 11,537 | over 1 year ago | Collection of resources for Web Pentesting #2 |
| XSS Polyglot Payloads #1 | 1,953 | about 3 years ago | Unleashing an Ultimate XSS Polyglot list by 0xsobky |
| XSS Polyglot Payloads #2 | 's XSS | ||
| Browser's-XSS-Filter-Bypass-Cheat-Sheet | 1,116 | over 8 years ago | Excellent List of working XSS bypasses running on the latest version of Chrome, Safari, Edge created by Masato Kinugawa |
| PortSwigger Web Penetration Testing Labs | |||
Awesome Pentest Cheat Sheets / Binary Exploitation | |||
| Binary Exploitation Red Team Notes | Ired.team notes for Binary Exploitation | ||
| Binary Exploitation Notes | Ir0nstone's Binary Exploitation Notes | ||
| Sticky Notes Binary Exploitation | Sticky Notes colletion for Binary Exploitation | ||
| checksec.py | 315 | about 1 year ago | Cross-Platform CheckSec Tool for checking binary security properties |
| HackTricks - Binary Exploitation | HackTricks Collection of Binary Exploitation | ||
| Liveoverflow - Binary Exploitation | LiveOverflow's Binary Exploitation YouTube playlist | ||
| PwnTools Cheat sheet | Cheat sheet for PwnTools python library | ||
| pwndbg Cheat sheet | Cheat sheet for pwndbg GDB plug-in | ||
| GDB PEDA Cheat sheet | 16 | over 8 years ago | Cheat sheet for PEDA GDB plug-in |
Awesome Pentest Cheat Sheets / Learning Platforms | |||
| Hack The Box :: Penetration Testing Labs | Leading penetration testing training labs platform | ||
| TryHackMe | Free online platform for learning cyber security & penetration testing | ||
| OWASP Vulnerable Web Applications Directory Project (Online) | List of online available vulnerable applications for learning purposes | ||
| Pentestit labs | Hands-on Pentesting Labs (OSCP style) | ||
| Root-me.org | Hundreds of challenges are available to train yourself in different and not simulated environments | ||
| Vulnhub.com | Vulnerable By Design VMs for practical 'hands-on' experience in digital security | ||
| Damn Vulnerable Xebia Training Environment | 102 | over 3 years ago | Docker Container including several vurnerable web applications (DVWA,DVWServices, DVWSockets, WebGoat, Juiceshop, Railsgoat, django.NV, Buggy Bank, Mutilidae II and more) |
| OWASP Vulnerable Web Applications Directory Project (Offline) | List of offline available vulnerable applications for learning purposes | ||
| Vulnerable SOAP Web Service | Vulnerable SOAP web service lab environment | ||
| Vulnerable Flask Web App | Vulnerable Flask Web App lab environment | ||
Awesome Pentest Cheat Sheets / Bug Bounty | |||
| Awesome BugBounty Tools | 4,371 | about 1 year ago | A curated list of various bug bounty tools |
| bug-bounty-platforms | 646 | over 1 year ago | Open-Sourced Collection of Bug Bounty Platforms |
| m0chan - Bug Bounty Methodology | m0chan's Bug Bounty Methodology Collection | ||
| NahamSec - Resources for Beginners | 10,820 | over 1 year ago | NahamSec's Resources for Beginner Bug Bounty Hunters Collection |
| AllAboutBugBounty | 5,902 | about 2 years ago | BugBounty notes gathered from various sources |
| Bug-Bounty-Resources | 65 | about 7 years ago | Collection of Bug Bounty Resources #1 |
| Bug-Bounty-Resources | 390 | over 3 years ago | Collection of Bug Bounty Resources #2 |
| Ryan John Bug Bounty Playlist | Collection of Ryan John's BugBounty videos ( ) | ||
| LiveOverFlow Bug Bounty Playlist | Collection of LiveOverflow's Bug bounty videos | ||
| BBRE Podcast | Bug Bounty Reports Explained Podcast | ||
| Critical Thinking Podcast | Critical Thinking Bug Bounty Podcast | ||
Awesome Pentest Cheat Sheets / Bug Bounty / Tools | |||
| Nmap Cheat Sheet | 373 | over 1 year ago | |
| SQLmap Cheat Sheet | 373 | over 1 year ago | |
| SQLmap Tamper Scripts | SQLmap Tamper Scripts General/MSSQL/MySQL | ||
| VIM Cheatsheet | |||
| Wireshark Display Filters | 373 | over 1 year ago | Filters for the best sniffing tool |
Awesome Pentest Cheat Sheets / Bug Bounty / Tools Online | |||
| revshells.com | Reverse shell payload generator ( ) | ||
| Segfault | Segfault: Free disposable root servers (by ) | ||
| suip.biz | Various free online pentesting tools like nmap, wpscan, sqlmap | ||
| XSS'OR Encoder/Decoder | Online Decoder/Encoder for testing purposes (@evilcos) | ||
| WebGun | WebGun, XSS Payload Creator (@brutelogic) | ||
| Hackvertor | Tool to convert various encodings and generate attack vectors (@garethheyes) | ||
| JSFiddle | Test and share XSS payloads, | ||
Awesome Pentest Cheat Sheets / Bug Bounty / Payloads | |||
| Fuzzdb | 8,288 | almost 2 years ago | Dictionary of attack patterns and primitives for black-box application testing Polyglot Challenge with submitted solutions |
| SecList | 59,209 | 11 months ago | A collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more |
Awesome Pentest Cheat Sheets / Bug Bounty / Write-Ups | |||
| Bug Bounty Reference | 3,770 | over 1 year ago | Huge list of bug bounty write-up that is categorized by the bug type (SQLi, XSS, IDOR, etc.) |
| Write-Ups for CTF challenges | |||
| Facebook Bug Bounties | Categorized Facebook Bug Bounties write-ups | ||
Awesome Pentest Cheat Sheets / Bug Bounty / Wireless Hacking | |||
| wifite2 | 30 | almost 9 years ago | Full automated WiFi security testing script |
Awesome Pentest Cheat Sheets / Bug Bounty / Defence Topics | |||
| Docker Security Cheat Sheet | The following tips should help you to secure a container based system | ||
| Windows Domain Hardening | 1,752 | almost 6 years ago | A curated list of awesome Security Hardening techniques for Windows |
Awesome Pentest Cheat Sheets / Bug Bounty / Programming | |||
| JavaScript Cheat Sheet | 6,691 | about 3 years ago | Learn JavaScript in one picture |
| Python Cheat Sheet #1 | 16 | about 10 years ago | Learn python3 in one picture |
| Python Cheat Sheet #2 | 4,990 | over 3 years ago | Learn python3 in one picture |
| Python Snippets Cheat Sheet | 373 | over 1 year ago | List of helpful re-usable code snippets in Python |