1. Pentest Cheat Sheet
  2. Scanning & Enumeration
  3. Information Gathering (Reconnaissance)
  4. Linux
    1. Enumeration
    2. Reverse Shell
    3. Privesc
    4. Buffer Overflow
    5. Check-list
  5. Windows
    1. File Upload
    2. Buffer Overflow
    3. Active Directory
    4. Privesc
    5. Port Forwarding/Tunneling
    6. Reverse Shell
    7. NTLM Hashes
    8. Maintaining Access
    9. Check-list
  6. Brute-Force
  7. Web Applications
    1. Enumeration
    2. SQL Injection
    3. File Upload
    4. Fuzzing
    5. LFI
    6. XSS
  8. Steganography
  9. MSF-Venom
  10. Memory Forensics
  11. Wireless Penetration Testing
  12. Open-Source Intelligence
  13. External Pentest Playbook