pentest-commands

Provide a comprehensive command reference for penetration testing tools including network scanning, exploitation, passwo...

github

metasploit-framework

Leverage the Metasploit Framework for comprehensive penetration testing, from initial exploitation through post-exploita...

github

linux-shell-scripting

Provide production-ready shell script templates for common Linux system administration tasks including backups, monitori...

github

linux-privilege-escalation

Execute systematic privilege escalation assessments on Linux systems to identify and exploit misconfigurations, vulnerab...

github

cloud-penetration-testing

Conduct comprehensive security assessments of cloud infrastructure across Microsoft Azure, Amazon Web Services (AWS), an...

github

wordpress-penetration-testing

Conduct comprehensive security assessments of WordPress installations including enumeration of users, themes, and plugin...

github

network-101

Configure and test common network services (HTTP, HTTPS, SNMP, SMB) for penetration testing lab environments. Enable han...

github

html-injection-testing

Identify and exploit HTML injection vulnerabilities that allow attackers to inject malicious HTML content into web appli...

github

windows-privilege-escalation

Provide systematic methodologies for discovering and exploiting privilege escalation vulnerabilities on Windows systems ...

github

wireshark-analysis

Execute comprehensive network traffic analysis using Wireshark to capture, filter, and examine network packets for secur...

github

file-path-traversal

Identify and exploit file path traversal (directory traversal) vulnerabilities that allow attackers to read arbitrary fi...

github

sql-injection-testing

Execute comprehensive SQL injection vulnerability assessments on web applications to identify database security flaws, d...

github

api-fuzzing-bug-bounty

Provide comprehensive techniques for testing REST, SOAP, and GraphQL APIs during bug bounty hunting and penetration test...

github

shodan-reconnaissance

Provide systematic methodologies for leveraging Shodan as a reconnaissance tool during penetration testing engagements. ...

github

broken-authentication

Identify and exploit authentication and session management vulnerabilities in web applications. Broken authentication co...

github

privilege-escalation-methods

Provide comprehensive techniques for escalating privileges from a low-privileged user to root/administrator access on co...

github

scanning-tools

Master essential security scanning tools for network discovery, vulnerability assessment, web application testing, wirel...

github

pentest-checklist

Provide a comprehensive checklist for planning, executing, and following up on penetration tests. Ensure thorough prepar...

github

aws-penetration-testing

Provide comprehensive techniques for penetration testing AWS cloud environments. Covers IAM enumeration, privilege escal...

github

idor-testing

Provide systematic methodologies for identifying and exploiting Insecure Direct Object Reference (IDOR) vulnerabilities ...

github

ssh-penetration-testing

Conduct comprehensive SSH security assessments including enumeration, credential attacks, vulnerability exploitation, tu...

github

ethical-hacking-methodology

Master the complete penetration testing lifecycle from reconnaissance through reporting. This skill covers the five stag...

github

xss-html-injection

Execute comprehensive client-side injection vulnerability assessments on web applications to identify XSS and HTML injec...

github

burp-suite-testing

Execute comprehensive web application security testing using Burp Suite's integrated toolset, including HTTP traffic int...

github