Pentest Tips
  • ABOUT
  • Information Shares
  • CTF
    • Stego
    • Memory
  • Blue Team
    • Tools/Resources
    • One Liners
    • Threat Hunting
    • Scripts
    • Intrusion
  • Web
    • Resources
    • General Web
    • Subdomain Discovery
    • Content Discovery
    • MYSQL
    • Burpsuite
  • Network Exploitation
    • Resources
    • Kerberos
    • Network Based
    • Phishing
    • Metasploit
    • Weaponization
    • Password Cracking
    • Shell Upgrades
    • Linux PrivEsc
    • Windows PrivEsc
    • Windows Persistence
    • Exfiltration
  • Windows Internals
    • Kernal
  • Recon
    • Nmap
    • OSINT
    • SMB Enumeration
    • LDAP
    • Physical
  • Malware
    • Obfuscation
  • Scripting
    • Bash Basics
    • Powershell Basics
  • Cloud
    • AWS
  • Game Hacking
    • Resources
Powered by GitBook
On this page
  • General Exploitation
  • Auto Enum Tools
  • Windows AD
  • Report Writing
Edit on GitHub
  1. Network Exploitation

Resources

PreviousBurpsuiteNextKerberos

Last updated 2 years ago

General Exploitation

Reverse Shell generator

Generates reverse shells in a plethora of languages.


CrackStation

A password dehasher that isn't good in the wild, but great for a super low hanging fruit.


Bloodhound CheatSheet

Useful Bloodhound queries.


Exploit Searching

Auto Enum Tools

Windows AD

READ ME. THIS IS IMPORTANT. This list is copied from a discord Resource section. Proceed with caution, as I have not vetted this list. Still, it may be useful and I didn't want to lose the post, so I copied it here:

Report Writing

LinPeas:

LinEnum:

LES (Linux Exploit Suggester):

Linux Smart Enumeration:

Linux Priv Checker:

PwnDoc:

PenTestReports:

https://www.revshells.com/
https://crackstation.net/
https://hausec.com/2019/09/09/bloodhound-cypher-cheatsheet/
NIST CVE List
ExploitDB
MITRE CVE List
MITRE CWE List
OWASP Top Ten
Microsoft CVE List
Linux Kernal CVEs
https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS
https://github.com/rebootuser/LinEnum
https://github.com/mzet-/linux-exploit-suggester
https://github.com/diego-treitos/linux-smart-enumeration
https://github.com/linted/linuxprivchecker
https://github.com/alphaSeclab/windows-security/blob/master/Readme_en.md
https://book.hacktricks.xyz/windows/active-directory-methodology
https://zer1t0.gitlab.io/posts/attacking_ad/
https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/
https://www.tarlogic.com/en/blog/how-kerberos-works/
https://www.tarlogic.com/en/blog/how-to-attack-kerberos/
https://book.hacktricks.xyz/windows/active-directory-methodology
https://zer1t0.gitlab.io/posts/attacking_ad/
https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html
https://www.silicon.fr/zerologon-faille-critique-active-directory-346780.html
https://github.com/GhostPack/Certify
https://posts.specterops.io/shadow-credentials-abusing-key-trust-account-mapping-for-takeover-8ee1a53566ab
https://github.com/tiyeuse/Active-Directory-Cheatsheet/
https://hideandsec.sh/books/cheatsheets-82c/page/active-directory
https://github.com/fuzz-security/Active-Directory-Exploitation-Cheat-Sheet
https://www.praetorian.com/blog/how-to-exploit-active-directory-acl-attack-paths-through-ldap-relaying-attacks/
https://www.infosecmatter.com/top-16-active-directory-vulnerabilities/
https://hausec.com/2019/03/12/penetration-testing-active-directory-part-ii/
http://www.harmj0y.net/blog/redteaming/a-guide-to-attacking-domain-trusts/
http://theredwindows.net/index.php/2021/02/12/exploitation-dacl-en-active-directory/
https://dirkjanm.io/krbrelayx-unconstrained-delegation-abuse-toolkit/
https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html
https://github.com/pwndoc/pwndoc
https://pentestreports.com/