bars
The VX-Files
search
circle-xmark
Ctrl
k
copy
Copy
chevron-down
🕸️
Network Pentesting
Tools
1. Pre-Engagement
chevron-right
2. Information gathering
chevron-right
3. Vulnerability assessment
chevron-right
4. Exploitation
chevron-right
5. Post-Exploitation & Persistence
chevron-right
6. Privilege escalation & Lateral movement
chevron-right
7. Reporting & Remediation
chevron-right
Last updated
2 years ago