1. Pentest Cheat Sheet
  2. 1. Scanning & Enumeration
  3. 2. Information Gathering (Reconnaissance)
  4. 3. Linux
    1. 3.1. Enumeration
    2. 3.2. Reverse Shell
    3. 3.3. Privesc
    4. 3.4. Buffer Overflow
    5. 3.5. Check-list
  5. 4. Windows
    1. 4.1. Enumeration
    2. 4.2. File Upload
    3. 4.3. Buffer Overflow
    4. 4.4. Active Directory
    5. 4.5. Privesc
    6. 4.6. Reverse Shell
    7. 4.7. NTLM Hashes
    8. 4.8. Maintaining Access
    9. 4.9. Check-list
  6. 5. Port Forwarding/Tunneling
  7. 6. Brute-Force
  8. 7. Web Applications
    1. 7.1. Enumeration
    2. 7.2. SQL Injection
    3. 7.3. File Upload
    4. 7.4. Fuzzing
    5. 7.5. LFI
    6. 7.6. XSS
  9. 8. OSINT
  10. 9. PassBack Attack
  11. 10. Steganography
  12. 11. MSF-Venom
  13. 12. Wireless Penetration Testing

Pentest Cheat Sheet

Pentest Cheat Sheet

Quick Links to Linux and Windows Checklist.

Linux Check-list

Windows Check-list

More useful notes on Pentesting

The hacking bible - hacktricks

TJnull’s Preparation Guide for PWK/OSCP

Introduction · Total OSCP Guide - sushant747

Another Pentest-Cheat-Sheet

Orange Cyber Security Arsenal