Till Studer's Notes

Recent Notes

  • Home

    Feb 05, 2022

  • Elastic Query Languages

    Apr 30, 2025

  • Prompt Engineering

    Apr 24, 2025

  • AI Tools

    Apr 24, 2025

  • Offensive Security

    Apr 11, 2025

Home

❯

01_Zettelkasten

❯

Penetration Testing

Feb 24, 20231 min read

Penetration Testing

Atlas

  • Penetration Testing Workflow
  • Get service overview of a individual host or network
  • Service Enumeration and Locating Public Exploits
  • Exploitation
  • Post-Exploitation Enumeration
  • Privilege Escalation
  • Persistence
  • Post-Escalation Enumeration
  • Pivoting

Principles

  • Breadth-first search

Cheat Sheets

  • MalAPI.io
  • Filesec.io
  • Unprotect Project
  • LoFP
  • LOLOL
  • GTFOBins
  • GTFOArgs
  • LOOBins
  • LOLBAS
  • LOLAPPS
  • LOFLCAB
  • LOTS Project
  • LOLDrivers
  • LOTPipeline
  • LOLRMM
  • LOLESXi
  • Bootloaders.io
  • HijackLibs
  • WADComs
  • Arsenal
  • Reconnoitre Config
  • Anti-Debug Tricks

Wikis

  • HackTricks
  • HackTricks Cloud
  • Pentester’s Promiscuous Notebook
  • The Hacker Recipes
  • Red Teaming Experiments
  • Red Team Notes 2.0
  • CheatSheets
  • otterhacker’s GitBook
  • OSCP Cheat Sheet and Command Reference
  • PayloadsAllTheThings
  • HardwareAllTheThings
  • Penetration Testing Tools Cheat Sheet
  • OSCP personal cheatsheet
  • OWASP Cheat Sheet Series
  • Infosec_Reference | An Information Security Reference That Doesn’t Suck!
  • CompassSecurity/security_resources: Collection of online security resources
  • A-poc/RedTeam-Tools: Tools and Techniques for Red Team / Penetration Testing
  • pentestmonkey
  • Penetration Testing Tools Cheat Sheet

Videos

  • IppSec

Tools

  • All Kali Tools
  • CVE Calculator
  • Exploit Database
  • VulnHub
  • Shodan
  • Flangvik/SharpCollection
  • djhohnstein/WireTap
  • blacklanternsecurity/writehat

Relevant Note(s): Offensive Security


Graph View

  • Penetration Testing
  • Atlas
  • Principles
  • Cheat Sheets
  • Wikis
  • Videos
  • Tools

Backlinks

  • Active Information Gathering
  • Buffer Overflow
  • Client-Side Attacks
  • Detection Engineering
  • Dorking
  • File Transfer Techniques
  • File Transfers
  • Firewall Evasion
  • Get service overview of a individual host or network
  • Information Security
  • Passive Information Gathering
  • Persistence
  • Phishing
  • Pivoting
  • Post-Escalation Enumeration
  • Post-Exploitation Enumeration
  • Privilege Escalation
  • Service Enumeration and Locating Public Exploits
  • Web Application Attacks
  • Home

Created with Quartz v4.5.0 © 2025

  • GitHub
  • LinkedIn
  • Email