Need help with pentest-book?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

six2dez
267 Stars 107 Forks 724 Commits 0 Opened issues

Services available

!
?

Need anything else?

Contributors list

No Data


description: >- This book contains a bunch of info, scripts and knowledge used during my

pentests.

/home/six2dez/.pentest-book

Thanks to visit this site, please consider enhance this book with some awesome tools or techniques you know, you can contact me by Telegram(@six2dez), Twitter(@six2dez1) or Discord(six2dez#8201), GitHub pull request is welcomed too ;) Hack 'em all

Usage: Just use the search bar at the upper or navigate through the sections of the left zone. Enjoy it 😊

Don't you know where to go now? Let me introduce you to some of the most popular pages on this wiki:

  • Know your target! Make a proper recon!
  • What can you do in those strange ports?
  • Doing a web pentest? Don't forget to check out any of these common attacks!
  • Do you have the same hype as me with cloud services? They also have their vulnerabilities
  • Stuck again with Windows and Kerberos? Here is my cheatsheet
  • The mobile world does not stop growing, see my tips for Android and iOS
  • Burp Suite is the tool most loved by everyone, but you have to know a few tricks, also check my preferred extensions
  • I'm really proud of Pentesting Web Checklist
  • If you want to know which web fuzzer fits you best, take a look at the comparison.

Important note: I use this wiki daily for my work and I am constantly updating it. I'm very sorry if a link to a page changes or I move it, if you need something you are free to contact me.

You can support this work buying me a coffee:

{% embed url="https://www.buymeacoffee.com/six2dez" %}

Stargazers over time

Stargazers over time

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.