Cheatsheets
โก CHEATSHEET DATABASE โก
Professional penetration testing reference guides
Enumeration
2 SheetsNetwork & Service Enumeration โ
Comprehensive guide for network scanning and service enumeration including Nmap, SMB, FTP, SSH, LDAP, SNMP, RDP, and Active Directory reconnaissance.
Linux Privilege Escalation โ
Complete privilege escalation techniques for Linux systems including SUID/SGID binaries, capabilities, cron jobs, kernel exploits, Docker escapes, and NFS exploitation.
Post-Exploitation
1 SheetTools & Scripts
Coming SoonPython Tools & Automation โ
Python scripting for penetration testing, automation tools, and custom exploit development frameworks.
COMING SOONTunneling & Pivoting โ
Network pivoting and tunneling techniques using Chisel, SSF, SSH tunnels, and port forwarding for lateral movement.
COMING SOONPassword Cracking โ
Hash cracking with Hashcat and John the Ripper, wordlist generation, and password attack strategies.
Platforms & Methodologies
Coming SoonHackTheBox Methodology โ
HTB-specific techniques, common patterns, and systematic approach to solving boxes efficiently.
COMING SOONActive Directory Attacks โ
Complete Active Directory attack chain including BloodHound, Kerberos attacks, credential dumping, and domain escalation.
COMING SOONWindows Privilege Escalation โ
Windows privilege escalation techniques including service exploits, registry manipulation, and token impersonation.
[TIP] Hover over any code block in the cheatsheets to reveal the copy button
[NOTE] All commands are tested in real penetration testing scenarios
[WARNING] Use these techniques only in authorized environments