Useful sites
Pentest Resources
https://osintframework.com/ List of sites and resources for intelligence gathering
https://www.regextester.com Test and debug regular expressions
https://nomodulenamed.com Helps to fix missing dependencies on Python packages
https://www.offensive-security.com/metasploit-unleashed Metasploit guide
https://www.revshells.com/ Quick reverse shell templates
OWASP Guidelines
Windows specific
https://lolbas-project.github.io/ List of common exploitable Windows tools\programs
https://github.com/Flangvik/SharpCollection Pre-compiled executables for in-memory execution
https://www.lemoda.net/windows/windows2unix/windows2unix.html Windows CMD reference
https://www.catalog.update.microsoft.com/ List of Windows hotfixes and updates
Active Directory
https://attack.stealthbits.com/ Active Directory attacks guide
https://wadcoms.github.io/ List of techniques for AD enumeration and exploit
Linux specific
https://gtfobins.github.io/ List of common *nix programs that can be exploited for PrivEsc
https://github.com/s0wr0b1ndef/Linux-Kernal-Exploits-m- List of linux kernel exploits
https://explainshell.com/ Breaks down a bash command and explains it
https://linux.die.net/man/ Linux man pages
Exploit databases
Exploit lists
CVEs lists
https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=<keyword or cve>
https://cvedetails.com/cve/<cve>
Fuzzying
Credentials
Forensics
Text obfuscation
Default credentials
Dictionaries
Hash cracking
Networking
Common Ports, Requests, Headers, Cookies...
http://useragentstring.com/?uas=<UA string>&getText=all
https://www.speedguide.net/port.php?port=<port number>
Search Hosts or services
https://www.whois.com/whois/<domain name>
Network security analysis services
https://www.ssllabs.com/ssltest/analyze.html?d=<url> SSL/TLS Configuration
https://sitereport.netcraft.com/?url= <url> SSL/TLS Configuration
https://securityheaders.com/?q=<url> HSTS Configuration
OSINT
Last updated