user-hoodieOffensive

These resources will inform you on different tools that can be used in different hacking phasesarrow-up-right (look at the Phases of Ethical Hacking section for a few examples). You can't stick to only certain tools because they might not work on certain targets. That's why you should familiarize yourself with a few that do the same thing.

CSbyGB - Pentipsarrow-up-right: extensive pentesting notes, tips, tools and resources by Gabrielle Botbol.

Infosec Housearrow-up-right: a comprehensive range of tools and resources for both offensive and defensive strategies.

OSINT Frameworkarrow-up-right: a collection of open-source intelligence (OSINT) tools, categorized for effective reconnaissance and data gathering.

PayloadsAllTheThingsarrow-up-right: a list of useful payloads and bypasses for Web Application Security.​

HardwareAllTheThingsarrow-up-right: a collection of valuable payloads and bypass techniques tailored for Hardware and IoT Security.

InternalAllTheThingsarrow-up-right: a repository of tools and techniques focused on internal network penetration testing, post-exploitation, and lateral movement.

HackTricks Bookarrow-up-right: a comprehensive, open-source cybersecurity knowledge base and penetration testing guidebook.

Pentest-Tools Google Hackingarrow-up-right: a tool for performing Google dorking (advanced search queries) to discover sensitive information exposed online.

Google Dorks Cheat Sheetarrow-up-right: a cheat sheet for Google dorking.

GTFOBinsarrow-up-right: a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.

LOLBin Projectarrow-up-right: a repository listing "Living Off the Land" binaries, scripts, and tools that can be leveraged for penetration testing and post-exploitation.

Wadcomsarrow-up-right: an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows/AD environments.

Pentestmonkey Reverse Shell Cheat Sheetarrow-up-right: a resource providing various reverse shell commands and techniques for penetration testers to use to get an interactive shell from the target.

Rmusser Docsarrow-up-right: a free resource (techniques, tools, tactics...) for anyone interested in learning more about information security.

Awesome Pentest GitHubarrow-up-right: a curated list of resources, tools, and references for penetration testing.

The Hacker Recipesarrow-up-right: is aimed at freely providing technical guides on various hacking topics.

iRed Teamarrow-up-right: notes about all things focusing on, but not limited to, red teaming and offensive security.

Last updated