Useful sites
Pentest Resources
- https://osintframework.com/ List of sites and resources for intelligence gathering 
- https://www.regextester.com Test and debug regular expressions 
- https://nomodulenamed.com Helps to fix missing dependencies on Python packages 
- https://www.offensive-security.com/metasploit-unleashed Metasploit guide 
- https://www.revshells.com/ Quick reverse shell templates 
OWASP Guidelines
Windows specific
- https://lolbas-project.github.io/ List of common exploitable Windows tools\programs 
- https://github.com/Flangvik/SharpCollection Pre-compiled executables for in-memory execution 
- https://www.lemoda.net/windows/windows2unix/windows2unix.html Windows CMD reference 
- https://www.catalog.update.microsoft.com/ List of Windows hotfixes and updates 
Active Directory
- https://attack.stealthbits.com/ Active Directory attacks guide 
- https://wadcoms.github.io/ List of techniques for AD enumeration and exploit 
Linux specific
- https://gtfobins.github.io/ List of common *nix programs that can be exploited for PrivEsc 
- https://github.com/s0wr0b1ndef/Linux-Kernal-Exploits-m- List of linux kernel exploits 
- https://explainshell.com/ Breaks down a bash command and explains it 
- https://linux.die.net/man/ Linux man pages 
Exploit databases
Exploit lists
CVEs lists
- https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=<keyword or cve> 
- https://cvedetails.com/cve/<cve> 
Fuzzying
Credentials
Forensics
Text obfuscation
Default credentials
Dictionaries
Hash cracking
Networking
Common Ports, Requests, Headers, Cookies...
- http://useragentstring.com/?uas=<UA string>&getText=all 
- https://www.speedguide.net/port.php?port=<port number> 
Search Hosts or services
- https://www.whois.com/whois/<domain name> 
Network security analysis services
- https://www.ssllabs.com/ssltest/analyze.html?d=<url> SSL/TLS Configuration 
- https://sitereport.netcraft.com/?url= <url> SSL/TLS Configuration 
- https://securityheaders.com/?q=<url> HSTS Configuration 
OSINT
Last updated