A set of recipes useful in pentesting and red teaming scenarios
Snippets, code samples and hints used in penetration tests stored in a single repository so it can be quickly accessed and searched during the assessments.
binHandy utilities to be run locallysnippetsAll things useful to be run remotely, code snippets, examples etcNotes.*All sort of helpers, lists and notes not necessarily related to specific service or stageTarget.Host.OS.*- Things that can be done once foothold is establishedTarget.Host.Service.*- Commands useful in enumeration and exploitation of particular serviceTarget.Network.*- Commands related to scanning and moving around networksTarget.Recon.*- Typical recon like DNS enumeration, OSINT etc.
- If there are more than three levels of hierarchy the file needs to be split.
- Sources (scripts) are located in the
snippetsdirectory (referenced by@). - Conventions:
~commands@file references-lists--comments (above the commented line)- OS specific commands:
~$(Linux, defaults to Bash)~#(Linux - root required)~>(Windows)
- Shell specific commands:
~PS>(Powershell)
- Variables:
VAR_ATTACKER_HOSTVAR_ATTACKER_PORTVAR_TARGET_DOMAINVAR_TARGET_HOSTVAR_TARGET_PORTVAR_TARGET_CIDRVAR_TARGET_RANGEVAR_TARGET_FILEVAR_USERNAMEVAR_PASSWORDVAR_NT_HASHVAR_LM_HASH(blank LM hash: aad3b435b51404eeaad3b435b51404ee)VAR_STRINGVAR_INTEGERVAR_HEXVAR_WORDLISTVAR_WORDLIST_*(VAR_WORDLIST_USERNAME,VAR_WORDLIST_PASSWORDetc)VAR_*_HOST(VAR_FTP_HOST,VAR_ZOMBIE_HOST,VAR_PROXY_HOSTetc)