InfoSecUberWiki
Introduction
Penetration Testing/Assessment Workflow
Reconnaissance
Passive/Semi-Passive Recon
Tools
Third Party Resources
Locate Target Range
Fingerprint Domain/Website
Extended Network Information
Metasploit Scanning
Shodan
Censys
Zoomeye
Netcraft
DNS Enumeration
Social Media
Command Line Recon
Network Information
Fingerprint Security Mechanisms
Metadata
CLI Tools
Tools
People Search
Active Recon
Command Line Recon
General Recon
Tools
Wi-Fi (WPS) Information Gathering
Automating Pentesting Tasks
Various Tools
Domain/Subdomain Enumeration
Nmap
Create Custom Wordlist
GUI
FOCA
Maltego
Dirbuster
Misc.
Sending Fake Emails
Google Searching/Dorking
Queries
Phishing
Frameworks
Initial Access Techniques
Malicious Office XLS Macros
Transform EXE -> PPT
Basic AUTH - HTML & Word
Tools - Internal Use
Credential Harvesting
Enumeration
Internal
Scanning
Map Internal Network
Command Line Tools
Linux Tools
SMB
SMBSpider
Authenticated SMB Sessions
User-Focused
Automato
Pivoting
Port Forwarding/Pivoting
SSH Proxy Tunneling
External
Scanning
Port Scanning/Banner Grabbing
SQL Vulnerability Scanning
Wireless
Client Sniffing
AWS
Fingerprinting
Dump Buckets
Exploitation
External
IPv6
Attack Toolkit
Attack Guide
Attack Windows
Full Guide
Attack Linux
Full Guide
Attack Web Applications/Technologies
Full Attack Frameworks/Scanners
Frameworks
Web Vulnerability Scanners
Attack CMS
Vulnerability Scanning
Wordpress
Joomla
HTTP/S
Steal Cookies
XSS
Generate XSS Payloads
XSS Scanner
XSS Plugin (Burp)
Bypass/Evasion Techniques
CSRF
Bypass CSRF Protections
Attack WAF
Frameworks/Guides
WAF Bypass
WAF Payloads
Attack BASIC Auth
Burp
Ncrack
Attack Crossdomain Policies
Attack Framework
Exploiting Crossdomain
Attack Web Vulnerabilities
Command Injection
Local File Inclusion (LFI)
Methodology/Guide
Attack Web Servers
Apache
Struts
Nginx
Attack OWA/Exchange
Malicious Outlook Rules
Abuse Exchange Services
Search Users Mailbox
Attack Routers
Frameworks
Using Burp
Attack Databases
Mongo
Attack RDP
MitM RDP
Attack AWS
Intro to AWS Security
Scanning
Attack Printers
Wiki
Framework
Internal
IPv6
Attack Toolkit
LAN Attacks
Attack Windows
Attack Frameworks
Attack Active Directory
Attack Kerberos
Attack Group Policy
Attack WSUS
Powershell Attacks
Frameworks
Scapy Attacks
Misc.
PsExec
Attack Linux/*NIX
AIX
Attack Databases
SQL
MSSQL
Attack Printers
Toolkit
Attack Protocols
NFS
RDP
Attack ICS
Framework
Privilege Escalation & Lateral Movement
Privilege Escalation
Windows
Linux/*NIX
Lateral Movement/Pivoting
MITM
Frameworks
Misc.
Bypass Security (AV/IDS/UAC)
AV
IDS/IPS
Application Whitelisting
UAC
Misc.
Physical
NFC
IoT
List of Hacks
Exploits
Finding Exploits - Web
Finding Exploits - Nmap/CLI
Wireless
Exploitation
Pentesting with Docker
WPA/2 Packet Injection
Cracking WPA/2
Crack PSK
MitM/Rogue AP/Router
Frameworks
Rogue Access Points
MitM
Phishing
Testing/Assessment Suites
Attack Cellular Networks
Toolkits
Command Shells
Reverse Shells
Post Exploitation
Attack Windows
Frameworks
Crack Passwords/Hashes
Steal Passwords/Hashes
Common Commands
Attack Linux/*NIX
Frameworks
Password Sniffing
Attack Software
Splunk
Exfiltration
Via DNS
Via RDP
Privilege Escalation
Windows
SMB
RDP
Manual Exploitation
Linux/*NIX
Exploits
Manual Exploitation
Password/Hash Cracking
Guides
Wordlists
Tools
Web Services
Learning Resources
OSCP
"Getting Started"
Blogs
Video Channels/Series
Hacking Labs/VMs
Free Courses
Fun Challenges
Fun Reading
Books
"How to" Guides
Various Cheat Sheets
Specific Topic Learning
Web Application Security/Vulnerabilities
XSS
SQLi
Deserialization
Incident Response
Scripting/Coding
Python
Powershell
tcpdump
Malware Analysis/RE
Exploit Development
Cryptography
YARA
Collections of Tools & Resources
Penetration Testing/Hacking Tools
CTF Tools & Resources
Guides
Practice
Red Teaming
Videos
Phases
Tips and Tricks
Guides
Powered by
GitBook
Linux Tools
arp -a
ip neigh show
smbtree -NS 2>/dev/null
nbtscan -r <current_IPrange>
netdiscover -r <current_IPrange>
nmap -n -Pn -T5 -sS <current_IPrange>
nmap NSE scripts
NFS
SMB
results matching "
"
No results matching "
"