Penetration Testing Resources Home Page
1 minute read
A one stop shop for guides and tools that could prove helpful during penetration testing, CTFs, security assessments, etc.
Guides / Resources
- New to Information Security Sites
- Active Directory
- API Testing
- AV Bypassing
- Buffer Overflows
- Cross-Site Request Forgery (CSRF)
- Cross-Site Scripting (XSS)
- Cryptography
- DLL Hacking
- Enumeration
- Exploit Development
- File Path Traversal
- File Upload Restrictions Bypass
- Fuzzing
- HTTP Request Smuggling
- Incident Response
- JSON Web Tokens
- Log4j
- Macros
- Kerberos
- Metasploit
- NFS
- OS Command Injection
- OSINT
- Other Exploitation Guides
- Phishing
- Physical Testing
- PowerShell
- Printer Hacking
- Privilege Escalation
- Proxy Guides
- Reconnaissance
- Shell Exploitation
- SQL Injection (SQLi)
- Vim
- Web Application Testing
- Web Cache Poisoning
- WiFi Hacking
- XML External Entity (XXE)
PenTesting Tools
- Active Directory
- Antivirus Evasion
- Code Review
- Command and Control
- Crawlers
- Deserialization
- Evidence Collection
- Frameworks
- Java
- John the Ripper
- Microsoft
- OSINT
- PowerShell
- Printer Hacking
- Privilege Escalation
- Shell Exploitation
- SQL Injection
- SSH
- Web Application Testing
- WiFi Hacking
- Wordlists
CTFs / Practice
Conferences
I feedback.
Let me know what you think of this article on twitter @_TheGetch_!
Let me know what you think of this article on twitter @_TheGetch_!