Main Page

From is a Penetration Testing and Red Team operations wiki

Cowsay.png is a wiki dedicated to professional penetration testing, offensive security or ethical hacking knowledge, techniques, tools and everything related. It is based in standards as PTES, CEH, OSSTMM among others.

DISCLAIMER: This is a site dedicated to professional penetration testing. It is illegal to perform any action against any hosts without prior consent and it is only allowed against your own infrastructure or during a professional customer engagement with prior written consent. Also note that even with that requirements to perform security testing in Microsoft Azure or Amazon AWS you must notice them beforehand.

Subscribe to our Newsletter

Subscribe to the newsletter to get updates and new articles

MODULE I: Infrastructure penetration testing

PHASE I: Reconnaissance
Passive reconnaissance
Active reconnaissance
PHASE II: Scanning
PHASE III: Enumeration
PHASE IV: Exploitation
Password cracking
Brute forcing
SQL Exploitation
msfvenom payloads
Network infrastructure
PHASE V: Post exploitation
Privilege Escalation
Data exfiltration
PowerShell frameworks
Password dumping
Escape environments
PHASE VI: Covering Tracks
PHASE VII: Lateral Movement
PTH: Pass the hash
PTT: Pass the ticket

MODULE II: Web application penetration testing

MODULE III: Mobile penetration testing


SecDevOps / Cloud Security

  • DEFECT DOJO: Security program and vulnerability management tool. Features: Imports XML output from nmap, nikto, burp, qualys, nessus, ...Integrates to Jira. Generates reports.


  • Metasploit: The world’s most used Penetration testing framework
  • PTF: Python script designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration testing.
  • Faradaysec: Faradaysec is an Integrated Multiuser Pentest Environment that maps and leverages all the knowledge you generate in real time.
  • Armitage: Cyber Attack Management for Metasploit
  • Cobalt Strike: Adversary Simulation and Red team Operations
  • OWTF: OWASP Offensive Web Testing Framework
  • PentestBox is an Opensource PreConfigured Portable Penetration Testing Environment for the Windows Operating System
  • ISF: Industrial Control System (ICS) Exploitation Framework based on Python


Paper Frameworks

  • MITRE CAPEC: Common Attack Pattern Enumeration and Classification. Specifies the attack patterns to attacks. I.e.: for a DOS attack (C) Abuse Existing Functionality – (210) -> (M) Flooding – (125) -> (S) UDP Flood – (486) [CVE-2003-0760]
  • OWASP ASVS 4.0: OWASP Application Security Verification Standard
  • CIS benchmarks
  • EICAR virus test

Test/Lab environments

  • HTB: Online platform with Penetration testing labs (Similar to OSCP labs)
  • DVWA: Damn Vulnerable Web Application
  • Kevgir: Multi Vulnerable Virtual Machine
  • WebGoat A deliberately insecure Web Application
  • Metasploitable 2 Metasploitable login is “msfadmin”; the password is also “msfadmin”.
  • Metasploitable 3 Is a VM that is built from the ground up with a large amount of security vulnerabilities. It is intended to be used as a target for testing exploits with metasploit.

HW things

  • syncStop SyncStop prevents accidental data exchange when your device is plugged into someone else’s computer or a public charging station
  • USBninja

Other tools

  • Greenshot Screenshots for reports in Windows
  • MobaXterm All-in-one terminal for Windows
  • TraceWrangler Easy sanitization and anonymization of PCAP and PCAPng files
  • noVNC VNC client using HTML5 (Web Sockets, Canvas) with encryption (wss://) support
  • butterfly A web terminal based on websocket and tornado
  • Mosh Mosh (mobile shell)
  • Ngrok ngrok exposes local servers behind NATs and firewalls to the public internet over secure tunnels.
  • Serveo Expose local servers to the internet
  • ssh-audit SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
  • testssl is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as recent cryptographic flaws and more
  • httpie A Curl-like tool for humans

Follow us / Contact


The best way to contribute is to spread the word or if you contribute improving the content and quality of the wiki. Get an account and register with your email, that's it.