Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/nixawk/pentest-wiki

PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.
https://github.com/nixawk/pentest-wiki

hacking pentest security

Last synced: about 6 hours ago
JSON representation

PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.

Awesome Lists containing this project

README

        

**Authors**: < [nixawk](https://github.com/nixawk) >, < [m1guelpf](https://github.com/m1guelpf) >, < [binarymist](https://github.com/binarymist) >

----

[![pentest-wiki](https://img.shields.io/badge/PENTEST-WIKI-black.svg)](https://github.com/nixawk/pentest-wiki) is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.

## Contents

- [![](https://img.shields.io/badge/Information%20Security%20Conferences-Index-blue.svg)](./Information-Security-Conferences)

- [![](https://img.shields.io/badge/Information%20Gathering-Index-blue.svg)](./1.Information-Gathering)

- Network Analysis
- IP
- [Whois](1.Information-Gathering/How-to-gather-Whois-Information-Gathering.md)
- [DNS](./1.Information-Gathering/How-to-gather-dns-information.md)
- Identify Live Hosts
- IDS/IPS Identification

- Web Application
- Web Application Fingerprint
- CMS Identification
- Open Source Analysis
- IDS/IPS Identification

- OSINT
- GHDB
- People
- Pictures
- Media
- Company
- Document

- [![](https://img.shields.io/badge/Vulnerability%20Assessment-Index-blue.svg)](./2.Vulnerability-Assessment)

- Vulnerability Scanners
- Network Assessment
- Web Application Assessment
- [OWASP CheatSheetSeries](https://github.com/OWASP/CheatSheetSeries/tree/master/cheatsheets)
- Database Assessment
- [MongoDB](./2.Vulnerability-Assessment/Database-Assessment/mongodb/mongodb_hacking.md)
- [MySQL](./2.Vulnerability-Assessment/Database-Assessment/mysql)
- [Postgresql](./2.Vulnerability-Assessment/Database-Assessment/postgresql/postgresql_hacking.md)
- [Sqlite](./2.Vulnerability-Assessment/Database-Assessment/sqlite/sqlite_hacking.md)

- Mobile Assessment
- [Android](./2.Vulnerability-Assessment/Android-Assessment)
- [OWASP-MASVS](https://github.com/OWASP/owasp-masvs)
- [OWASP-MSTG](https://github.com/OWASP/owasp-mstg/)
- OS Assessment
- [Mac OSX](./2.Vulnerability-Assessment/OS-Assessment/OSX)

- [![](https://img.shields.io/badge/Exploitation%20Tools-Index-blue.svg)](./3.Exploitation-Tools) & [![](https://img.shields.io/badge/Post%20Exploitation-Index-blue.svg)](./4.Post-Exploitation)
- Network Exploitation
- [Vulnerable Ports List](./3.Exploitation-Tools/Network-Exploitation/ports_number.md)
- [Cisco ASA CVE-2016-6366](./4.Post-Exploitation/How-to-hack-Cisco-ASA-with-CVE-2016-6366.md)
- OS Exploitation
- Windows
- [Windows 2008 Active Directory Hacking](./4.Post-Exploitation/Windows_ActiveDirectory/Hacking_Windows_Active_Directory.md)
- [Windows 2012 Credentials dump](./4.Post-Exploitation/Windows_ActiveDirectory/How-to-dump-windows2012-credentials.md)
- [Metasploit - run vbs payload in cmd.exe](./4.Post-Exploitation/Windows_ActiveDirectory/Execute_metasploit_vbs_payload_in_cmd_shell.md)
- [Windows Vssadmin](./4.Post-Exploitation/Windows_ActiveDirectory/How-to-use-vssadmin.md)
- Web Exploitation
- Database Exploitation
- Wireless Exploitation
- Social Engineering
- Physical Exploitation
- Open Source Exploitation

- [![](https://img.shields.io/badge/Privilege%20Escalation-Index-blue.svg)](./5.Privilege-Escalation)
- Password Attacks
- Privilege Escalation Media
- [Windows Privilege Escalation Fundamentals](http://www.fuzzysecurity.com/tutorials/16.html)
- [Basic Linux Privilege Escalation](https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/)

- Protocol Analysis
- Spoofing Analysis

- [![](https://img.shields.io/badge/Maintaining%20Access-Index-blue.svg)](./6.Maintaining-Access)
- OS Backdoors
- Tunneling
- Web Backdoors

- [![](https://img.shields.io/badge/Reporting-Index-blue.svg)](./7.Reporting)
- [Public pentesting reports](https://github.com/juliocesarfort/public-pentesting-reports)

- [![](https://img.shields.io/badge/Books-Index-blue.svg)](./Books)
- [Penetration Testing Books](./Books/README.md#penetration-testing-books)
- [Hackers Handbook Series](./Books/README.md#hackers-handbook-series)
- [Defensive Development](./Books/README.md#defensive-development)
- [Network Analysis Books](./Books/README.md#network-analysis-books)
- [Reverse Engineering Books](./Books/README.md#reverse-engineering-books)
- [Malware Analysis Books](./Books/README.md#malware-analysis-books)
- [Windows Books](./Books/README.md#windows-books)
- [Social Engineering Books](./Books/README.md#social-engineering-books)
- [Lock Picking Books](./Books/README.md#lock-picking-books)
- [OSINT Books](./Books/README.md#osint-books)

- [![](https://img.shields.io/badge/CTFs-Index-blue.svg)](./CTFS)
- [Flick](./CTFS/Flick)
- [Nebula](./CTFS/Nebula)
- [NullByte-1](./CTFS/NullByte/NullByte-1.md)

- [![](https://img.shields.io/badge/Reverse%20Engineering-Index-blue.svg)](./Reverse-Engineering)

- [![](https://img.shields.io/badge/System%20Services-Index-blue.svg)](./System-Services)
- [FTP](./System-Services/services/service-ftp.md)
- [HTTP](https://gist.github.com/willurd/5720255)

## How to contribute

1. Check for open issues or open a fresh issue to start a discussion around a feature idea or a bug.
2. Fork [the repository](https://github.com/nixawk/pentest-wiki) on GitHub to start making your changes to the **master** branch (or branch off of it).
3. Send a pull request and bug the maintainer until it gets merged and published.

## Links
- [The Penetration Testing Execution Standard](http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines)
- [Penetration Testing Framework 0.59](http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html)
- [How To Become A Hacker](http://www.catb.org/esr/faqs/hacker-howto.html)
- [Github - awesome-pentest](https://github.com/enaqx/awesome-pentest)