exploitpedia.org is a Penetration Testing and Red Team operations wiki
exploitpedia.org is a wiki dedicated to professional penetration testing, offensive security or ethical hacking knowledge, techniques, tools and everything related. It is based in standards as PTES, CEH, OSSTMM among others.
DISCLAIMER: This is a site dedicated to professional penetration testing. It is illegal to perform any action against any hosts without prior consent and it is only allowed against your own infrastructure or during a professional customer engagement with prior written consent. Also note that even with that requirements to perform security testing in Microsoft Azure or Amazon AWS you must notice them beforehand.
- 1 Subscribe to our Newsletter
- 2 MODULE I: Infrastructure penetration testing
- 3 MODULE II: Web application penetration testing
- 4 MODULE III: Mobile penetration testing
- 5 Links
- 6 HW things
- 7 Other tools
- 8 Follow us / Contact
- 9 Contribute
Subscribe to our Newsletter
MODULE I: Infrastructure penetration testing
|PHASE I: Reconnaissance|
|PHASE II: Scanning|
|PHASE III: Enumeration|
|PHASE IV: Exploitation|
|PHASE V: Post exploitation|
|PHASE VI: Covering Tracks|
|PHASE VII: Lateral Movement|
|PTH: Pass the hash|
|PTT: Pass the ticket|
MODULE II: Web application penetration testing
MODULE III: Mobile penetration testing
SecDevOps / Cloud Security
- DEFECT DOJO: Security program and vulnerability management tool. Features: Imports XML output from nmap, nikto, burp, qualys, nessus, ...Integrates to Jira. Generates reports.
- Metasploit: The world’s most used Penetration testing framework
- PTF: Python script designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration testing.
- Faradaysec: Faradaysec is an Integrated Multiuser Pentest Environment that maps and leverages all the knowledge you generate in real time.
- Armitage: Cyber Attack Management for Metasploit
- Cobalt Strike: Adversary Simulation and Red team Operations
- OWTF: OWASP Offensive Web Testing Framework
- PentestBox is an Opensource PreConfigured Portable Penetration Testing Environment for the Windows Operating System
- ISF: Industrial Control System (ICS) Exploitation Framework based on Python
- MITRE CAPEC: Common Attack Pattern Enumeration and Classification. Specifies the attack patterns to attacks. I.e.: for a DOS attack (C) Abuse Existing Functionality – (210) -> (M) Flooding – (125) -> (S) UDP Flood – (486) [CVE-2003-0760]
- OWASP ASVS 4.0: OWASP Application Security Verification Standard
- CIS benchmarks
- EICAR virus test
- HTB: Online platform with Penetration testing labs (Similar to OSCP labs)
- DVWA: Damn Vulnerable Web Application
- Kevgir: Multi Vulnerable Virtual Machine
- WebGoat A deliberately insecure Web Application
- Metasploitable 2 Metasploitable login is “msfadmin”; the password is also “msfadmin”.
- Metasploitable 3 Is a VM that is built from the ground up with a large amount of security vulnerabilities. It is intended to be used as a target for testing exploits with metasploit.
- syncStop SyncStop prevents accidental data exchange when your device is plugged into someone else’s computer or a public charging station
- Greenshot Screenshots for reports in Windows
- MobaXterm All-in-one terminal for Windows
- TraceWrangler Easy sanitization and anonymization of PCAP and PCAPng files
- noVNC VNC client using HTML5 (Web Sockets, Canvas) with encryption (wss://) support
- butterfly A web terminal based on websocket and tornado
- Mosh Mosh (mobile shell)
- Ngrok ngrok exposes local servers behind NATs and firewalls to the public internet over secure tunnels.
- Serveo Expose local servers to the internet
- ssh-audit SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
- testssl testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more
Follow us / Contact
The best way to contribute is to spread the word or if you contribute improving the content and quality of the wiki. Get an account and register with your email, that's it.