░▒▓ pentesting-cookbook ▓▒░ A set of recipes useful in fast-paced pentesting / red teaming scenarios
│ Snippets, code samples and hints used in penetration │░
│ tests stored in a single repository so it can be │░
│ quickly accessed and searched during assessments. │░
│ Some of these were collected around the Web, some │░
│ developed. Feel free to contribute! │░
│ https://github.com/tasooshi/pentesting-cookbook │░
Formatting / structure rules
- Since this handbook was not originally intended to be shared some parts may miss their original sources. I'll do my best to give proper credits and I hope you can help me with that.
- Formatting may seem quite exotic at first but this is the way I prefer to read. Thanks to indentation I can instantly see hierarchy and quickly scan interesting sections.
- This documentation structure gives best results with quick open, multi-line editing and full-text search options available in some popular text editors (like Sublime Text or VS Code).
- If there are more than three levels of hierarchy the file needs to be split.
- Categories in file names are separated with ".".
- If there is not enough in given category they can be grouped with "+".
- Commands: "~".
- Lists: "- ".
- Comments: "# ".
- OS specific commands:
- Shell specific commands:
- VAR_*_HOST (VAR_FTP_HOST, VAR_ZOMBIE_HOST, VAR_PROXY_HOST etc)