TheBlog of TheGetch

  • Home
  • All Posts
  • Search

Penetration Testing Resources Home Page

on July 24, 2020 under Penetration
1 minute read

A one stop shop for guides and tools that could prove helpful during penetration testing, CTFs, security assessments, etc.

Guides / Resources

  • New to Information Security Sites
  • Active Directory
  • API Testing
  • AV Bypassing
  • Buffer Overflows
  • Cross-Site Request Forgery (CSRF)
  • Cross-Site Scripting (XSS)
  • Cryptography
  • DLL Hacking
  • Enumeration
  • Exploit Development
  • File Path Traversal
  • File Upload Restrictions Bypass
  • Fuzzing
  • HTTP Request Smuggling
  • Incident Response
  • JSON Web Tokens
  • Log4j
  • Macros
  • Kerberos
  • Metasploit
  • NFS
  • OS Command Injection
  • OSINT
  • Other Exploitation Guides
  • Phishing
  • Physical Testing
  • PowerShell
  • Printer Hacking
  • Privilege Escalation
  • Proxy Guides
  • Reconnaissance
  • Shell Exploitation
  • SQL Injection (SQLi)
  • Vim
  • Web Application Testing
  • Web Cache Poisoning
  • WiFi Hacking
  • XML External Entity (XXE)

PenTesting Tools

  • Active Directory
  • Antivirus Evasion
  • Code Review
  • Command and Control
  • Crawlers
  • Deserialization
  • Evidence Collection
  • Frameworks
  • Java
  • John the Ripper
  • Microsoft
  • OSINT
  • PowerShell
  • Printer Hacking
  • Privilege Escalation
  • Shell Exploitation
  • SQL Injection
  • SSH
  • Web Application Testing
  • WiFi Hacking
  • Wordlists

CTFs / Practice

Conferences

I feedback.
Let me know what you think of this article on twitter @_TheGetch_!
© 2021 TheGetch with Jekyll.