The VX-Files
search
Ctrlk
The VX-Files
search
Ctrlk
  • README.txt
  • For updates, questions, suggestions or just chatting: @malcrvzarrow-up-right-from-square
  • Download your own local copy or check my other libre projects: Github/malcrvzarrow-up-right-from-square
  • 📕Cybersecurity Theory
    • Indexchevron-right
  • 🐧Linux Essentials
    • Indexchevron-right
  • 🪟Windows Essentials
    • Indexchevron-right
  • 🌍Networking Essentials
    • Indexchevron-right
  • 🕸️Network Pentesting
    • Toolschevron-right
      • 1. Pre-Engagementchevron-right
      • 2. Information gatheringchevron-right
      • 3. Vulnerability assessmentchevron-right
      • 4. Exploitationchevron-right
      • 5. Post-Exploitation & Persistencechevron-right
      • 6. Privilege escalation & Lateral movementchevron-right
      • 7. Reporting & Remediation
    • Techniqueschevron-right
    • Resourceschevron-right
  • 💉Web App pentesting
    • Toolschevron-right
    • Techniqueschevron-right
    • Resourceschevron-right
  • 📡Wireless pentesting
    • Tools
    • Techniques
    • Resources
  • 🔓On-Premises Pentesting
    • Tools
    • Techniqueschevron-right
    • Resources
  • 💽Disks & Forensics
    • Indexchevron-right
  • 🕷️Bash scripts
    • coming soon
  • ⚡PowerShell Scripts
    • coming soon
  • 🟩HTB Walkthroughs
    • coming soon
  • 🏴‍☠️External Resources
    • Schools
    • Books & Wikis
    • Utilities
    • Interactive cheat sheets
    • Wordlists
gitbookPowered by GitBook
Page cover
block-quoteOn this pagechevron-down
  1. 🕸️Network Pentesting

Tools

1. Pre-Engagementchevron-right2. Information gatheringchevron-right3. Vulnerability assessmentchevron-right4. Exploitationchevron-right5. Post-Exploitation & Persistencechevron-right6. Privilege escalation & Lateral movementchevron-right7. Reporting & Remediationchevron-right

Last updated 2 years ago