The VX-Files
search
⌘Ctrlk
The VX-Files
search
⌘Ctrlk
  • README.txt
  • For updates, questions, suggestions or just chatting: @malcrvzarrow-up-right
  • Download your own local copy or check my other libre projects: Github/malcrvzarrow-up-right
  • 📕Cybersecurity Theory
    • Index
  • 🐧Linux Essentials
    • Index
  • 🪟Windows Essentials
    • Index
  • 🌍Networking Essentials
    • Index
  • 🕸️Network Pentesting
    • Tools
      • 1. Pre-Engagement
      • 2. Information gathering
      • 3. Vulnerability assessment
      • 4. Exploitation
      • 5. Post-Exploitation & Persistence
      • 6. Privilege escalation & Lateral movement
      • 7. Reporting & Remediation
    • Techniques
    • Resources
  • 💉Web App pentesting
    • Tools
    • Techniques
    • Resources
  • 📡Wireless pentesting
    • Tools
    • Techniques
    • Resources
  • 🔓On-Premises Pentesting
    • Tools
    • Techniques
    • Resources
  • 💽Disks & Forensics
    • Index
  • 🕷️Bash scripts
    • coming soon
  • ⚡PowerShell Scripts
    • coming soon
  • 🟩HTB Walkthroughs
    • coming soon
  • 🏴‍☠️External Resources
    • Schools
    • Books & Wikis
    • Utilities
    • Interactive cheat sheets
    • Wordlists
gitbookPowered by GitBook
Page cover
block-quoteOn this pagechevron-down
  1. 🕸️Network Pentesting

Tools

1. Pre-Engagementchevron-right2. Information gatheringchevron-right3. Vulnerability assessmentchevron-right4. Exploitationchevron-right5. Post-Exploitation & Persistencechevron-right6. Privilege escalation & Lateral movementchevron-right7. Reporting & Remediationchevron-right

Last updated 2 years ago