Notes and collection of tools for pentests Read the docs: https://pentesting.readthedocs.io Contents: Network information gathering Exploit Development Remote shells Transferring files Privilege escalation Password attacks Networking Metasploit Oneliners Iptables OS enumeration HTTP scanning Version mapping