{"id":395,"date":"2020-11-26T16:34:34","date_gmt":"2020-11-26T15:34:34","guid":{"rendered":"https:\/\/mikadmin.fr\/blog\/?page_id=395"},"modified":"2023-09-10T12:22:32","modified_gmt":"2023-09-10T10:22:32","slug":"pentest-cheatsheet","status":"publish","type":"page","link":"https:\/\/mikadmin.fr\/blog\/pentest-cheatsheet\/","title":{"rendered":"Pentest CheatSheet"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\"><\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">min read<\/span><\/span><p>Views: 4838<\/p>\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>Pentest Tips &amp; Tricks :<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/jivoi.github.io\/2015\/07\/01\/pentest-tips-and-tricks\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/jivoi.github.io\/2015\/07\/01\/pentest-tips-and-tricks\/<\/a><br><a href=\"https:\/\/github.com\/Voorivex\/pentest-guide\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/github.com\/Voorivex\/pentest-guide<\/a><br><a href=\"https:\/\/github.com\/coreb1t\/awesome-pentest-cheat-sheets\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/coreb1t\/awesome-pentest-cheat-sheets<\/a><br><a href=\"https:\/\/github.com\/ahmetgurel\/Pentest-Hints\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/github.com\/ahmetgurel\/Pentest-Hints<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"reverse-shell-generator\" style=\"font-size:30px\"><strong>Reverse shell generator :<\/strong><\/h2>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/www.revshells.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.revshells.com\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>Name That Hash :<\/strong><\/p>\n\n\n\n<blockquote class=\"wp-block-quote has-text-align-center is-layout-flow wp-block-quote-is-layout-flow\">\n<p>The Modern Hash Identification System<\/p>\n<\/blockquote>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/nth.skerritt.blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/nth.skerritt.blog\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"web-application-penetration-testing-checklist\" style=\"font-size:25px\">Web Application Penetration Testing Checklist :<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/alike-lantern-72d.notion.site\/Web-Application-Penetration-Testing-Checklist-4792d95add7d4ffd85dd50a5f50659c6\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/alike-lantern-72d.notion.site\/Web-Application-Penetration-Testing-Checklist-4792d95add7d4ffd85dd50a5f50659c6<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/r3surr3c7.gitbook.io\/notes\/web-pentesting-checklist\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/r3surr3c7.gitbook.io\/notes\/web-pentesting-checklist<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/pentestbook.six2dez.com\/others\/web-checklist\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/pentestbook.six2dez.com\/others\/web-checklist<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/thackamura.github.io\/web-checklist\/\" target=\"_blank\" rel=\"noopener\">https:\/\/thackamura.github.io\/web-checklist\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"api-security-checklist\">API-Security-Checklist :<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/github.com\/shieldfy\/API-Security-Checklist\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/shieldfy\/API-Security-Checklist<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"wadcoms\">WADComs :<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><em>WADComs is an interactive cheat sheet, containing a curated list of offensive security tools and their respective commands, to be used against Windows\/AD environments.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/wadcoms.github.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/wadcoms.github.io\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"xss-cheat-sheet\">XSS Cheat Sheet :<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/portswigger.net\/web-security\/cross-site-scripting\/cheat-sheet\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/portswigger.net\/web-security\/cross-site-scripting\/cheat-sheet<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/hackersonlineclub.com\/cross-site-scripting-xss\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/hackersonlineclub.com\/cross-site-scripting-xss\/<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/0xhorizon.eu\/cheat-sheet\/xss\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/0xhorizon.eu\/cheat-sheet\/xss\/<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/kipalog.com\/posts\/Some-XSS-payload\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/kipalog.com\/posts\/Some-XSS-payload<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/chawdamrunal.medium.com\/xss-cheat-sheet-e8b8261963c9\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/chawdamrunal.medium.com\/xss-cheat-sheet-e8b8261963c9<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/book.hacktricks.xyz\/pentesting-web\/xss-cross-site-scripting\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/book.hacktricks.xyz\/pentesting-web\/xss-cross-site-scripting<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/snoopysecurity.github.io\/web-application-security\/2019\/08\/02\/08_common_xss_payloads_i_use.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/snoopysecurity.github.io\/web-application-security\/2019\/08\/02\/08_common_xss_payloads_i_use.html<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/netsec.expert\/posts\/xss-in-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/netsec.expert\/posts\/xss-in-2021\/<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/XSS_Filter_Evasion_Cheat_Sheet.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/XSS_Filter_Evasion_Cheat_Sheet.html<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">SQL Injection CheatSheet :<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/www.hackingloops.com\/sql-injection-cheat-sheet\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.hackingloops.com\/sql-injection-cheat-sheet\/<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/github.com\/kleiton0x00\/Advanced-SQL-Injection-Cheatsheet\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/kleiton0x00\/Advanced-SQL-Injection-Cheatsheet<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/admiralgaust.github.io\/SQL-Injection-cheat-sheet\/\" target=\"_blank\" rel=\"noopener\">https:\/\/admiralgaust.github.io\/SQL-Injection-cheat-sheet\/<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/cybr.com\/ethical-hacking-archives\/sqlmap-cheat-sheets-to-help-you-find-sql-injections\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cybr.com\/ethical-hacking-archives\/sqlmap-cheat-sheets-to-help-you-find-sql-injections\/<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/www.interviewbit.com\/sql-injection-cheat-sheet\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.interviewbit.com\/sql-injection-cheat-sheet\/<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/brightsec.com\/blog\/sql-injection-payloads\/\" target=\"_blank\" rel=\"noopener\">https:\/\/brightsec.com\/blog\/sql-injection-payloads\/<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/owasp.org\/www-community\/attacks\/SQL_Injection_Bypassing_WAF\" target=\"_blank\" rel=\"noopener\">https:\/\/owasp.org\/www-community\/attacks\/SQL_Injection_Bypassing_WAF<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"offensive-security-cheatsheet\">OFFENSIVE SECURITY CHEATSHEET :<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/cheatsheet.haax.fr\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cheatsheet.haax.fr\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\" id=\"useful-one-liners\">Useful one liners :<\/h1>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/gist.github.com\/johnnypea\/b0cd77e5734d65691fa21d93274b305b\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/gist.github.com\/johnnypea\/b0cd77e5734d65691fa21d93274b305b<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>Explainshell : <\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>write down a command-line to see the help text that matches each argument.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/explainshell.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/explainshell.com\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>CTF Cheatsheet :<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/github.com\/Rajchowdhury420\/CTF-CheatSheet\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/Rajchowdhury420\/CTF-CheatSheet<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/github.com\/sl4x0\/Web-CTF-Cheatsheet\" target=\"_blank\" rel=\"noopener\">https:\/\/github.com\/sl4x0\/Web-CTF-Cheatsheet<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>All About OSCP :<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/oscp.infosecsanyam.in\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/oscp.infosecsanyam.in\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>OWASP Cheatsheet :<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/cheatsheetseries.owasp.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cheatsheetseries.owasp.org\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>Security Knowledge Base :<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"http:\/\/github.sofianehamlaoui.fr\/Security-Cheatsheets\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/github.sofianehamlaoui.fr\/Security-Cheatsheets\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\" id=\"privilege-escalation-windows\">Privilege Escalation Windows :<\/h1>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/sushant747.gitbooks.io\/total-oscp-guide\/content\/privilege_escalation_windows.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/sushant747.gitbooks.io\/total-oscp-guide\/content\/privilege_escalation_windows.html<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/lolbas-project.github.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/lolbas-project.github.io\/<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/github.com\/swisskyrepo\/PayloadsAllTheThings\/blob\/master\/Methodology%20and%20Resources\/Windows%20-%20Privilege%20Escalation.md\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/swisskyrepo\/PayloadsAllTheThings\/blob\/master\/Methodology%20and%20Resources\/Windows%20-%20Privilege%20Escalation.md<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/book.hacktricks.xyz\/windows\/windows-local-privilege-escalation\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/book.hacktricks.xyz\/windows\/windows-local-privilege-escalation<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>CyberChef :<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>The Cyber Swiss Army Knife &#8211; a web app for encryption, encoding, compression and data analysis.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/gchq.github.io\/CyberChef\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/gchq.github.io\/CyberChef\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>Aperi&rsquo;Solve :<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Aperi&rsquo;Solve is an online platform which performs layer analysis on image.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/aperisolve.fr\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/aperisolve.fr\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>XOR Calculator<\/strong> :<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Calculate the exclusive or (XOR) with a simple web-based calculator. Input and output in binary, decimal, hexadecimal or ASCII.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"http:\/\/xor.pw\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/xor.pw\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>Hackitude<\/strong> :<\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/www.hackitude.in\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.hackitude.in\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>GTFOBINS<\/strong> :<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems.<\/em><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/gtfobins.github.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/gtfobins.github.io\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>OSCP-CHEATSHEET<\/strong> :<\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/github.com\/Swafox\/OSCP\/blob\/master\/oscp-cheatsheet.md\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/Swafox\/OSCP\/blob\/master\/oscp-cheatsheet.md<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>HackTricks<\/strong> :<\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/book.hacktricks.xyz\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/book.hacktricks.xyz\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>Bug Bounty Cheatsheet\/Tools\/Templates<\/strong> :<\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/m0chan.github.io\/2019\/12\/17\/Bug-Bounty-Cheetsheet.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/m0chan.github.io\/2019\/12\/17\/Bug-Bounty-Cheetsheet.html<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/github.com\/EdOverflow\/bugbounty-cheatsheet\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/github.com\/EdOverflow\/bugbounty-cheatsheet<\/a><br><a href=\"https:\/\/taksec.github.io\/google-dorks-bug-bounty\/\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/taksec.github.io\/google-dorks-bug-bounty\/<\/a><br><a href=\"https:\/\/github.com\/topscoder\/nuclei-wordfence-cve\" target=\"_blank\" rel=\"noopener\" title=\"\">https:\/\/github.com\/topscoder\/nuclei-wordfence-cve<\/a><br><a href=\"https:\/\/github.com\/daffainfo\/AllAboutBugBounty\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/daffainfo\/AllAboutBugBounty<\/a><br><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>Payloads All The Things<\/strong> :<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>A list of useful payloads and bypass for Web Application Security and Pentest\/<a href=\"https:\/\/mikadmin.fr\/blog\/tryhackme-overpass-3\/\" target=\"_blank\" rel=\"noreferrer noopener\">CTF<\/a><\/em>.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/github.com\/swisskyrepo\/PayloadsAllTheThings\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/swisskyrepo\/PayloadsAllTheThings<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>Active Directory attack cheat sheet :<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/casvancooten.com\/posts\/2020\/11\/windows-active-directory-exploitation-cheat-sheet-and-command-reference\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/casvancooten.com\/posts\/2020\/11\/windows-active-directory-exploitation-cheat-sheet-and-command-reference\/<\/a><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/github.com\/S1ckB0y1337\/Active-Directory-Exploitation-Cheat-Sheet\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/S1ckB0y1337\/Active-Directory-Exploitation-Cheat-Sheet<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>Active Directory Enumeration :<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/www.hackingarticles.in\/active-directory-enumeration-powerview\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.hackingarticles.in\/active-directory-enumeration-powerview\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>Red Teaming Experiments<\/strong> :<\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/www.ired.team\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.ired.team\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>OSINT-FR | Tools to begin in Open Source Intelligence :<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/osintfr.com\/en\/tools\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/osintfr.com\/en\/tools\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\" id=\"windows-enumeration\" style=\"font-size:30px\">Windows Enumeration :<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><a href=\"https:\/\/nored0x.github.io\/red-teaming\/windows-enumeration\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/nored0x.github.io\/red-teaming\/windows-enumeration\/<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n\n\n\n<p class=\"has-text-align-center\" style=\"font-size:30px\"><strong>Hacking Tools Cheat Sheet <\/strong>:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/pbs.twimg.com\/media\/EH8WqSWWwAE132x.png\" alt=\"pentest\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blog.compass-security.com\/wp-content\/uploads\/2019\/10\/hacking_tools_cheat_sheet_v1.0-1.png\" alt=\"\"\/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity is-style-default\"\/>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\"><\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">min read<\/span><\/span>Views: 4838 Pentest Tips &amp; Tricks : https:\/\/jivoi.github.io\/2015\/07\/01\/pentest-tips-and-tricks\/https:\/\/github.com\/Voorivex\/pentest-guidehttps:\/\/github.com\/coreb1t\/awesome-pentest-cheat-sheetshttps:\/\/github.com\/ahmetgurel\/Pentest-Hints Reverse shell generator : https:\/\/www.revshells.com\/ Name That Hash : The Modern Hash Identification System https:\/\/nth.skerritt.blog\/ Web Application Penetration Testing Checklist : https:\/\/alike-lantern-72d.notion.site\/Web-Application-Penetration-Testing-Checklist-4792d95add7d4ffd85dd50a5f50659c6 https:\/\/r3surr3c7.gitbook.io\/notes\/web-pentesting-checklist https:\/\/pentestbook.six2dez.com\/others\/web-checklist https:\/\/thackamura.github.io\/web-checklist\/ API-Security-Checklist : https:\/\/github.com\/shieldfy\/API-Security-Checklist WADComs : WADComs is&hellip; <a href=\"https:\/\/mikadmin.fr\/blog\/pentest-cheatsheet\/\" class=\"more-link\">Continuer la lecture <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1516,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-395","page","type-page","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/pages\/395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/comments?post=395"}],"version-history":[{"count":1,"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/pages\/395\/revisions"}],"predecessor-version":[{"id":2959,"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/pages\/395\/revisions\/2959"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/media\/1516"}],"wp:attachment":[{"href":"https:\/\/mikadmin.fr\/blog\/wp-json\/wp\/v2\/media?parent=395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}