Attention: The articles published on this wiki are for education purpose, to use during a CTF or for an authorized penetrationtest. By using the wiki, you've agreed to use this knowledge in an ethical way and do not evil in any perspective.
Pentestmonket, taking the monkey work out of pentesting. A great website with all kind of reverse shells and other cool stuff to make your work as pentester easier.
Visit: Pentestmonkey
GTFOBins is a curated list of Unix binaries that can used to bypass local security restrictions in misconfigured systems.
The project collects legitimate functions of Unix binaries that can be abused to get the f**k break out restricted shells, escalate or maintain elevated privileges, transfer files, spawn bind and reverse shells, and facilitate the other post-exploitation tasks.
It is important to note that this is not a list of exploits, and the programs listed here are not vulnerable per se, rather, GTFOBins is a compendium about how to live off the land when you only have certain binaries available.
GTFOBins is a collaborative project created by Emilio Pinna and Andrea Cardaci where everyone can contribute with additional binaries and techniques.
Visit: GTFObins
LOLBAS is the Windows GTFObins.
Living Off The Land Binaries and Scripts (and now also Libraries)
Visit: LOLBAS
WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.
Visit: WADComs
This is a super collection for pentesting on Github.
Visit: Payload All The Things
A great website about pentesting with a nice cheatsheet
Visit: High on Coffee
A great website with a lot of information about penetration testing.
Visit: Hacktricks
OWASP published a lot of information about security online. Even some nice cheatsheets which could be handy.
Visit: OWASP Cheatsheets
OSINT Framework....... Visit: OSINT Framework
This websites generates awesome photos of people who don't exist. These photos can be used for a fake profile. Every time the website is refreshed a new photo is generated Visit: This person does not exist
Common Vulnerability Scoring System Calculator or shorted to CVSS calculator v3.1 can be used to calculate a vulnerability score.
OWASP risk calculator based on the OWASP risk rating methodology