Penetration Testing

These resources are useful for Pentest/Red Team related certification preparation [collection from 2016]

OSCP preparation Writeup https://www.jimwilbur.com/oscp-links/arrow-up-right

https://www.willchatham.com/general/oscp-and-pwk-tips-resources-tools/arrow-up-right

https://gist.github.com/unfo/5ddc85671dcf39f877aaf5dce105fac3arrow-up-right

https://hausec.com/pentesting-cheatsheet/arrow-up-right

https://www.fabbricabinaria.it/home/blog/11-news/64-offensive-security-oscp-certificationarrow-up-right

https://www.securitysift.com/offsec-pwb-oscp/arrow-up-right

https://github.com/frizb/OSCP-Survival-Guide/blob/master/OSCP_Helpful_Links.mdarrow-up-right

https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/arrow-up-right

https://netsec.ws/?p=337arrow-up-right

https://www.rcesecurity.com/2014/07/slae-shell-reverse-tcp-shellcode-linux-x86/arrow-up-right

http://www.fuzzysecurity.com/tutorials.htmlarrow-up-right

https://www.corelan.be/index.php/articles/arrow-up-right

http://www.securitytube.net/arrow-up-right

http://www.offensive-security.com/blog/arrow-up-right

http://blog.g0tmi1k.com/arrow-up-right

http://captf.com/practice-chttps://www.jimwilbur.com/2017/07/oscp-review/tf/arrow-up-right

http://resources.infosecinstitute.com/tools-of-trade-and-resources-to-prepare-in-a-hacker-ctf-competition-or-challenge/#grefarrow-up-right

http://kooksec.blogspot.com/arrow-up-right

http://chandel1.rssing.com/chan-10364660/all_p30.htmlarrow-up-right

Linux privilege escalation:

https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/arrow-up-right

Windows privilege escalation:

http://www.fuzzysecurity.com/tutorials/16.htmlarrow-up-right

Meterpreter payloads:

http://netsec.ws/?p=331arrow-up-right

Reverse shells:

http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheetarrow-up-right

http://www.thewindowsclub.com/smb-port-what-is-port-445-port-139-used-forarrow-up-right

Web Security Resources:

https://www.pentesterlab.com/exercises/web_for_pentesterarrow-up-right

https://www.pentesterlab.com/exercises/linux_host_reviewarrow-up-right

https://forum.bugcrowd.com/t/researcher-resources-getting-started/115arrow-up-right

https://blog.bugcrowd.com/getting-started-bug-bounty-hunter-methodologyarrow-up-right

https://blog.bugcrowd.com/tips-from-top-hackers-bug-hunting-methodology-and-the-importance-of-writing-quality-submissionsarrow-up-right

Metasploit :

http://www.securitytube.net/groups?operation=view&groupId=10arrow-up-right

https://www.offensive-security.com/metasploit-unleashed/arrow-up-right

Buffer overflow :

https://www.youtube.com/watch?v=1S0aBV-Waeoarrow-up-right

https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/arrow-up-right

http://insecure.org/stf/smashstack.htmlarrow-up-right

https://www.vortex.id.au/2017/05/pwkoscp-stack-buffer-overflow-practice/arrow-up-right

http://netsec.ws/?p=180http://www.securitytube.net/groups?operation=view&groupId=4arrow-up-right

Exploit writing:

http://www.securitytube.net/groups?operation=view&groupId=7arrow-up-right

Assembly language

http://www.securitytube.net/groups?operation=view&groupId=5arrow-up-right

Enumeration:

http://www.0daysecurity.com/penetration-testing/enumeration.htmlarrow-up-right

https://nmap.org/nsedoc/arrow-up-right

Refer fyodor’s defcon video on “nmap: scanning theinternet” https://www.youtube.com/watch?v=Hk-21p2m8YYarrow-up-right

Shell Exploitation

http://www.lanmaster53.com/2011/05/7-linux-shells-using-built-in-tools/arrow-up-right

https://netsec.ws/?p=331arrow-up-right

Binary

http://www.fuzzysecurity.com/tutorials/expDev/1.htmlarrow-up-right

Privilege escalation:

https://github.com/rebootuser/LinEnumarrow-up-right

http://www.securitysift.com/download/linuxprivchecker.pyarrow-up-right

http://pentestmonkey.net/category/cheat-sheet/shellarrow-up-right

http://www.fuzzysecurity.com/tutorials/16.htmlarrow-up-right

https://github.com/GDSSecurity/Windows-Exploit-Suggesterarrow-up-right

https://www.youtube.com/watch?v=PC_iMqiuIRQarrow-up-right

https://www.adampalmer.me/iodigitalsec/2013/08/13/mysql-root-to-system-root-with-udf-for-windows-and-linux/arrow-up-right

http://pwnwiki.io/#!privesc/windows/index.mdarrow-up-right

https://github.com/PenturaLabs/Linux_Exploit_Suggesterarrow-up-right

http://www.greyhathacker.net/?p=738arrow-up-right

Windows Privilege Escalation

https://www.youtube.com/watch?v=kMG8IsCohHAarrow-up-right

https://github.com/GDSSecurity/Windows-Exploit-Suggesterarrow-up-right

Linux Privilege Escalation

https://www.youtube.com/watch?v=dk2wsyFiosgarrow-up-right

https://www.rebootuser.com/?p=1623arrow-up-right

Privilege escalation recon scripts:

http://pentestmonkey.net/tools/audit/unix-privesc-checkarrow-up-right

http://www.abatchy.com/2017/02/oscp-like-vulnhub-vms.htmlarrow-up-right

https://netsecfocus.slack.comarrow-up-right

Online games:

http://resources.infosecinstitute.com/hacking-lab/arrow-up-right

http://blog.pushebx.com/2011/03/penetration-testing-iso.htmlarrow-up-right

http://captf.com/practice-ctf/arrow-up-right

http://overthewire.org/wargames/arrow-up-right

http://overthewire.org/wargames/natas/arrow-up-right

nebula

https://ctf365.com/arrow-up-right

https://www.hackthebox.gr/arrow-up-right

Root-me.org

https://www.pentesterlab.com/exercisesarrow-up-right

Linux

http://linuxcommand.orgarrow-up-right

https://linuxjourney.com/arrow-up-right

http://www.tldp.org/LDP/Bash-Beginners-Guide/html/arrow-up-right

https://www.explainshell.com/arrow-up-right

https://linux.die.net/man/arrow-up-right

exploits:

http://www.kitploit.com/2017/05/reconnoitre-security-tool-for.htmlarrow-up-right

Tools:Tools:Tools:Tools:Tools:Tools:Tools:Tools:Tools:Tools:Tools:Tools:Tools:Tools:Tools:Tools:Tools:Tools:Tools:Tools:

http://osintframework.com/arrow-up-right

Netcat:

Ncat: http://www.binarytides.com/netcat-tutorial-for-beginners/arrow-up-right

https://null-byte.wonderhowto.com/how-to/hack-like-pro-use-netcat-swiss-army-knife-hacking-tools-0148657/arrow-up-right

https://github.com/gabemarshall/Brosecarrow-up-right

https://github.com/1N3/Sn1perarrow-up-right

TCP/IP

https://support.microsoft.com/en-us/help/172983/explanation-of-the-three-way-handshake-via-tcp-iparrow-up-right

http://techgenix.com/understanding-udp-protocol/arrow-up-right

https://www.digitalocean.com/community/tutorials/ssh-essentials-working-with-ssh-servers-clients-and-keysarrow-up-right

https://www.digitalocean.com/community/tutorials/how-to-route-web-traffic-securely-without-a-vpn-using-a-socks-tunnelarrow-up-right

https://www.redbooks.ibm.com/redbooks/pdfs/gg243376.pdfarrow-up-right

Code academy:

https://www.codecademy.com/arrow-up-right

https://learnpythonthehardway.org/arrow-up-right

https://www.codecademy.com/learn/learn-the-command-linearrow-up-right

https://www.ibm.com/developerworks/library/l-lpic1-103-1/arrow-up-right

http://www.greenteapress.com/thinkpython/thinkpython.htmlarrow-up-right

Automate the Boring Stuff with Python: Practical Programming for Total Beginners 1st Edition

http://www.primalsecurity.net/tutorials/python-tutorials/arrow-up-right

Payloads:

https://rmccurdy.com/scripts/downloaded/www.offensive-security.com/arrow-up-right

github

https://github.com/enaqx/awesome-pentestarrow-up-right

oscp useful tools:

https://github.com/frizb/OSCP-Survival-Guide/blob/master/README.mdarrow-up-right

https://github.com/burntmybagel/OSCP-Preparrow-up-right

https://jivoi.github.io/2015/06/19/oscp-prepare/arrow-up-right

https://github.com/xapax/oscp/arrow-up-right

https://github.com/opendns/Security_Ninjas_AppSec_Trainingarrow-up-right

https://github.com/chrisallenlane/cheatarrow-up-right

https://github.com/tldr-pages/tldrarrow-up-right

https://github.com/ferreirasc/oscparrow-up-right

https://guif.re/webtestingoscparrow-up-right

http://www.computersecurity.org/computer-cyber-security-certifications-education-college-courses/cheat-sheet-how-to-pass-the-oscp-offensive-security-certified-professional-exam-step-by-step-guide-network-pivoting-part-7/arrow-up-right

http://hackingandsecurity.blogspot.com/2016/04/oscp-related-notes.htmlarrow-up-right

https://www.gitbook.com/book/belouve/belouve-infosec/detailsarrow-up-right

https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/arrow-up-right

http://mateustymbu.xpg.uol.com.br/Bibliography/Pentest_Checklist.pdfarrow-up-right

https://www.mrb3n.com/?page_id=329arrow-up-right

http://blackpentesters.blogspot.com/2013/12/pentesting-with-backtrack-pwb-offensive.htmlarrow-up-right

http://www.vishalitacademy.com/oscparrow-up-right

https://blog.propriacausa.de/wp-content/uploads/2016/07/oscp_notes.htmlarrow-up-right

http://infosectalk.com/my-oscp-notes/arrow-up-right

https://sushant747.gitbooks.io/total-oscp-guide/content/arrow-up-right

http://bytec0de.com/blog/oscp-prepration-time-tutorial-basics-commands-and-understandings/arrow-up-right

http://ramunix.blogspot.com/2016/10/oscp-cheat-sheet.htmlarrow-up-right

https://github.com/re-pronin/pwk-cheatsheetarrow-up-right

nmap nse:

https://hackertarget.com/7-nmap-nse-scripts-recon/arrow-up-right

https://www.timborninkhof.com/oscp-exam-review/arrow-up-right

http://www.hackingarticles.in/hack-lord-root-vm-ctf-challenge/arrow-up-right

https://www.willchatham.com/security/kioptrix-level-1-3-vm-4-walkthrough/arrow-up-right

http://www.security-geek.in/arrow-up-right

https://www.vulnhub.com/arrow-up-right

http://techorganic1.rssing.com/chan-5366139/all_p2.htmlarrow-up-right

https://ethicalhackers.club/arrow-up-right

http://www.securityartist.com/the-hackers-library/arrow-up-right

http://justpentest.blogspot.com/arrow-up-right

http://www.offensive-security.com/metasploit-unleashed/Main_Pagearrow-up-right

http://www.hackingtutorials.orgarrow-up-right

https://www.offensive-security.com/information-security-training/penetration-testing-with-kali-linux/arrow-up-right

https://www.offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional/arrow-up-right

https://www.kernel-exploits.com/arrow-up-right

https://backdoorshell.gitbooks.io/oscp-useful-links/content/arrow-up-right

http://www.primalsecurity.net/0x0-exploit-tutorial-buffer-overflow-vanilla-eip-overwrite-2/arrow-up-right

https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalationarrow-up-right

https://vulnhub.comarrow-up-right

www.greyhathacker.net/?p=738/arrow-up-right

www.youtube.com/watch?v=kMG8IsCohHA&feature=youtu.bearrow-up-right

http://0daysecurity.com/penetration-testing/enumeration.htmlarrow-up-right

https://crackstation.net/arrow-up-right

http://www.scoop.it/t/d-n3narrow-up-right

http://it-ovid.blogspot.com/2012/02/windows-privilege-escalation.htmlarrow-up-right

http://pentestmonkey.net/tools/windows-privesc-checkarrow-up-right

www.youtube.com/watch?v=kMG8IsCohHAarrow-up-right

http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formatsarrow-up-right

www.toshellandback.com/2015/11/24/ms-priv-esc/arrow-up-right

https://geekviews.tech/kali-linux-commands-complete-list/arrow-up-right

http://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/arrow-up-right

http://pentestmonkey.net/arrow-up-right

https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/arrow-up-right

http://www.toshellandback.com/arrow-up-right

https://highon.coffee/arrow-up-right

https://pinboard.in/u:unfo/t:oscparrow-up-right

https://github.com/PaulSec/awesome-sec-talksarrow-up-right

http://www.rockfishsec.com/arrow-up-right

http://batserver.co.uk/Batlabarrow-up-right

https://www.offensive-security.com/metasploit-unleashed/portfwd/arrow-up-right

http://netsec.ws/?p=278arrow-up-right

https://junksecurity.com/taking-the-course-and-exam-preparation/arrow-up-right

http://ianthomasfry.blogspot.com/2017/05/oscp-exam-study-guide-i-first-steps.htmlarrow-up-right

https://insekurity.wordpress.com/arrow-up-right

https://www.nop.cat/nmapscans/arrow-up-right

https://github.com/1N3/PrivEscarrow-up-right

https://github.com/xapax/oscp/blob/master/linux-template.mdarrow-up-right

https://github.com/xapax/oscp/blob/master/windows-template.mdarrow-up-right

https://github.com/slyth11907/Cheatsheetsarrow-up-right

https://github.com/erik1o6/oscp/arrow-up-right

https://highon.coffee/blog/lord-of-the-root-walkthrough/arrow-up-right

MsfVenom

https://www.offensive-security.com/metasploit-unleashed/msfvenom/arrow-up-right

Shell Escape Techniques

https://pen-testing.sans.org/blog/2012/06/06/escaping-restricted-linux-shellsarrow-up-right

https://airnesstheman.blogspot.ca/2011/05/breaking-out-of-jail-restricted-shell.htmlarrow-up-right

https://speakerdeck.com/knaps/escape-from-shellcatraz-breaking-out-of-restricted-unix-shellsarrow-up-right

Pivoting

http://www.fuzzysecurity.com/tutorials/13.htmlarrow-up-right

http://exploit.co.il/networking/ssh-tunneling/arrow-up-right

https://www.sans.org/reading-room/whitepapers/testing/tunneling-pivoting-web-application-penetration-testing-36117arrow-up-right

https://highon.coffee/blog/ssh-meterpreter-pivoting-techniques/arrow-up-right

https://0x90909090.blogspot.ie/2015/07/no-one-expect-command-execution.htmlarrow-up-right

https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/\#grefarrow-up-right

https://github.com/mzet-/linux-exploit-suggesterarrow-up-right

https://github.com/SecWiki/linux-kernel-exploitsarrow-up-right

https://highon.coffee/blog/linux-commands-cheat-sheet/arrow-up-right

https://www.defensecode.com/public/DefenseCode_Unix_WildCards_Gone_Wild.txtarrow-up-right

https://github.com/lucyoa/kernel-exploitsarrow-up-right

https://www.rebootuser.com/?p=1758arrow-up-right

https://www.securitysift.com/download/linuxprivchecker.pyarrow-up-right

https://www.youtube.com/watch?v=1A7yJxh-fycarrow-up-right

https://www.youtube.com/watch?v=2NMB-pfCHT8arrow-up-right

https://www.youtube.com/watch?v=MN3FH6Pyc_garrow-up-right

https://www.slideshare.net/nullthreat/fund-linux-priv-esc-wprotectionsarrow-up-right

https://www.exploit-db.com/exploits/39166/arrow-up-right

https://www.exploit-db.com/exploits/15274/arrow-up-right

https://blog.cobaltstrike.com/2014/03/20/user-account-control-what-penetration-testers-should-know/arrow-up-right

https://github.com/foxglovesec/RottenPotatoarrow-up-right

https://github.com/GDSSecurity/Windows-Exploit-Suggester/blob/master/windows-exploit-suggester.pyarrow-up-right

https://github.com/pentestmonkey/windows-privesc-checkarrow-up-right

https://github.com/PowerShellMafia/PowerSploitarrow-up-right

https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/ATT%26CK-Stuff/Windows/Windows_Privilege_Escalation.mdarrow-up-right

https://github.com/SecWiki/windows-kernel-exploitsarrow-up-right

https://hackmag.com/security/elevating-privileges-to-administrative-and-further/arrow-up-right

https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/arrow-up-right

https://toshellandback.com/2015/11/24/ms-priv-esc/arrow-up-right

https://www.gracefulsecurity.com/privesc-unquoted-service-path/arrow-up-right

https://www.commonexploits.com/unquoted-service-paths/arrow-up-right

https://www.exploit-db.com/dll-hijacking-vulnerable-applications/arrow-up-right

https://www.youtube.com/watch?v=kMG8IsCohHA&feature=youtu.bearrow-up-right

https://www.youtube.com/watch?v=vqfC4gU0SnYarrow-up-right

https://www.exumbraops.com/penetration-testing-102-windows-privilege-escalation-cheatsheet/Xarrow-up-right

https://www.fuzzysecurity.com/tutorials/16.htmlarrow-up-right

http://www.labofapenetrationtester.com/2015/09/bypassing-uac-with-powershell.htmlarrow-up-right

Interesting reading:

https://code.google.com/p/pentest-bo.../BookmarksListarrow-up-right

http://resources.infosecinstitute.co...door-python-z/arrow-up-right

https://blog.netspi.com/netspis-top-...ords-for-2014/arrow-up-right

https://github.com/SpiderLabs/Responderarrow-up-right

http://windowssecrets.com/top-story/arrow-up-right

http://resources.infosecinstitute.co...using-ollydbg/arrow-up-right

https://www.corelan.be/index.php/200...t-development/arrow-up-right

http://jbremer.org/mona-101-a-global-samsung-dll/arrow-up-right

http://sgros-students.blogspot.sg/20...cs-part-1.htmlarrow-up-right

http://sgros-students.blogspot.sg/20...cs-part-2.htmlarrow-up-right

http://blog.cobaltstrike.com/2014/03...s-should-know/arrow-up-right

http://www.pretentiousname.com/misc/...hitelist2.htmlarrow-up-right

http://www.pretentiousname.com/misc/...c_details.htmlarrow-up-right

http://withinwindows.com/2009/02/05/...ated-binaries/arrow-up-right

https://www.exploit-db.com/bypassing...vista7-mirror/arrow-up-right

http://security.stackexchange.com/qu...-for-windows-7arrow-up-right

http://www.primalsecurity.net/0x8-ex...ive-egghunter/arrow-up-right

http://hackerforhire.com.au/arrow-up-right

http://n01g3l.tumblr.com/arrow-up-right

http://veneetbhardwaj.blogspot.sg/arrow-up-right

http://nethekk.blogspot.sg/2014/01/slmail-exploit.htmlarrow-up-right

https://github.com/samratashok/nishangarrow-up-right

http://j3rge.blogspot.sg/arrow-up-right

https://twitter.com/ithurricaneptarrow-up-right

https://github.com/hfiref0xarrow-up-right

https://zdresearch.com/internet-expl...rop-genration/arrow-up-right

http://www.justanotherhacker.com/201...web-shell.htmlarrow-up-right

http://woshub.com/how-to-extract-win...-hiberfil-sys/arrow-up-right

http://rycon.hu/papers/goldenticket.htmlarrow-up-right

http://www.beneaththewaves.net/Proje...lkthrough.htmlarrow-up-right

Exploit and vulnerability databases:

http://www.exploit-db.comarrow-up-right

https://code.google.com/p/google-sec...ry&cells=tilesarrow-up-right

http://packetstormsecurity.com/files/os/7arrow-up-right

https://packetstormsecurity.com/arrow-up-right

http://farlight.org/index.html?type=localarrow-up-right

Restricted shell escape:

https://blog.netspi.com/breaking-out...ix-and-kiosks/arrow-up-right

http://blog.g0tmi1k.com/2011/08/basi...ge-escalation/arrow-up-right

https://blog.netspi.com/windows-priv...or-privileges/arrow-up-right

https://blog.netspi.com/windows-priv...in-privileges/arrow-up-right

http://harmj0y.netarrow-up-right

http://www.tarasco.org/arrow-up-right

ROP: ASLR and DEP/NX:

https://www.trustwave.com/Resources/...X-ASLR-bypass/arrow-up-right

http://security.stackexchange.com/qu...es-aslr-dep-nxarrow-up-right

http://en.wikipedia.org/wiki/Return-...ed_programmingarrow-up-right

http://www.mastropaolo.com/2005/06/0...d-bits-part-1/arrow-up-right

https://samsclass.info/127/proj/rop.htmarrow-up-right

http://nicholas.carlini.com/papers/2...ropattacks.pdfarrow-up-right

https://ctf-team.vulnhub.com/picoctf-2014-hardcore-rop/arrow-up-right

Boot to root websites:

https://exploit-exercises.com/arrow-up-right

http://0daysecurity.com/pentest.htmlarrow-up-right

http://blog.agupieware.com/2014/10/h...ng-victim.htmlarrow-up-right

Pentesting blogs:

https://idzer0.comarrow-up-right

Reconnaissance websites:

http://whois.domaintools.com/nextdc.comarrow-up-right

Shell codes:

https://www.exploit-db.com/shellcode/arrow-up-right

http://www.secdev.org/projects/shellforge/arrow-up-right

https://www.corelan.be/index.php/201...2-shellcoding/arrow-up-right

http://www.leidecker.info/downloads/index.shtml#shellsarrow-up-right

https://github.com/dotcppfile/Serbotarrow-up-right

http://shell-storm.org/shellcode/arrow-up-right

http://bernardodamele.blogspot.sg/20...ne-liners.htmlarrow-up-right

Tools to hide Shells:

https://www.veil-framework.com/arrow-up-right

EggHunters:

Exploit Development:

https://github.com/SaltwaterC/sploit-toolsarrow-up-right

https://github.com/r41p41/snippetsarrow-up-right

https://github.com/byt3bl33d3r/MITMfarrow-up-right

https://www.qualys.com/research/top10/2014/07/arrow-up-right

Password leaks/lists:

http://www.leakedin.comarrow-up-right

http://securityxploded.com/passwordsecrets.phparrow-up-right

OSCP reviews:

http://popped.ioarrow-up-right

Hash cracking:

http://forum.insidepro.com/viewforum...72f1dc23055572arrow-up-right

http://www.hashkiller.co.ukarrow-up-right

Information Gathering:

https://github.com/leebaird/discoverarrow-up-right

https://bitvijays.github.io/blog/2015/04/09/learning-from-the-field-intelligence-gathering/arrow-up-right

http://toshellandback.com/2015/11/24/ms-priv-esc/arrow-up-right

https://github.com/azmatt/windowsEnumarrow-up-right

Pivoting:

https://www.offensive-security.com/metasploit-unleashed/proxytunnels/arrow-up-right

https://github.com/rofl0r/proxychains-ngarrow-up-right

Local File Inclusion / Remote File Inclusion:

https://pentesterlab.com/exercises/php_include_and_post_exploitation/coursearrow-up-right

https://www.exploit-db.com/papers/12992/arrow-up-right

http://www.itninja.com/blog/view/mysql-and-apache-profile-log-path-locationsarrow-up-right

SQLi:

https://www.exploit-db.com/papers/12975/arrow-up-right

https://websec.wordpress.com/2010/12/04/sqli-filter-evasion-cheat-sheet-mysql/arrow-up-right

https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/arrow-up-right

BruteForce w/ Burp Suite:

https://pentestlab.wordpress.com/2012/12/21/brute-force-attack-with-burp/arrow-up-right

Reverse Shell Cheat Sheet/various shells:

http://pentestmonkey.net/tools/web-shells/php-reverse-shellarrow-up-right

http://pentestmonkey.net/tools/web-shells/perl-reverse-shellarrow-up-right

https://github.com/bartblaze/PHP-backdoorsarrow-up-right

https://github.com/BlackArch/webshellsarrow-up-right

Password Cracking:

https://hashkiller.co.uk/ntlm-decrypter.aspxarrow-up-right

Intro to Pentest Books:

Git Book - https://backdoorshell.gitbooks.io/oscp-useful-links/content/arrow-up-right

Ctf guide bt vijays : https://bitvijays.github.io/LFC-VulnerableMachines.htmlarrow-up-right

https://www.owasp.org/images/1/19/OTGv4.pdfarrow-up-right

Penetration Testing Standards:

https://www.crest-approved.org/wp-content/uploads/CREST-Penetration-Testing-Guide.pdfarrow-up-right

https://www.owasp.org/index.php/Web_Application_Penetration_Testingarrow-up-right

https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contentsarrow-up-right

https://www.owasp.org/index.php/Penetration_testing_methodologiesarrow-up-right

Last updated

Was this helpful?