<p align="center"><img src="static/logo.png" alt="CheatSheet" width="40" height="40"></p>

<h1 align="center">Pentest Cheat Sheets <a href=#><img src="https://custom-icon-badges.demolab.com/badge/become-a_red-FF0000.svg?logo=blackhat&logoColor=white" alt="become a red"></a></h1>

<div align="center">
  <strong>Collection of cheat sheets useful for pentesting</strong><br>
  Convenient commands for your pentesting / red-teaming engagements, OSCP and CTFs.<br>
</div>
<sub>&nbsp;Precautionary Measure</sub>
<br>
<a href=https://notabug.org/pakhom/pentest-cheatsheet/src/master/general/laws-and-regulations.md><img src="https://custom-icon-badges.demolab.com/badge/-LAWS_&_REGULATIONS-FF0000?style=for-the-badge&logo=gitbook&logoColor=white" alt="become a red"></a>
## General

1. **[Linux Hardening](general/linux-hardening.md)**
    - [Useful Linux Commands)](general/linux-hardening.md#useful-linux-commands)
    - [Bypass Linux Shell Restrictions](general/linux-hardening.md#bypass-linux-shell-restrictions)
    - [Linux Environment Variables](general/linux-hardening.md#linux-environment-variables)
2. **[MacOs Hardening](general/mac-hardening.md)**
    - [macOS Useful Commands](general/mac-hardening.md#macos-useful-commands)
    - [macOS Auto Start Locations](general/mac-hardening.md#macos-auto-start-locations)
3. **[Windows Hardening](general/windows-hardening.md)**
    - [Active Directory Methodology](general/windows-hardening.md#active-directory-methodology)
    - [Windows Security Controls](general/windows-hardening.md#windows-security-controls)
    - [NTLM](general/windows-hardening.md#ntlm)
    - [Lateral Movement](general/windows-hardening.md#lateral-movement)
    - [Stealing Windows Credentials](general/windows-hardening.md#stealing-windows-credentials)
    - [CMD](general/windows-hardening.md#cmd)
    - [PowerShell](general/windows-hardening.md#powershell)
4. **[Shells (Linux, Windows, MSFVenom)](general/shells.md)**
    - [Shells MSFVenom](general/shells.md#shells–msfvenom)
    - [Shells Windows](general/shells.md#shells-windows)
    - [Shells Linux](general/shells.md#shells-linux)

## Discovery
* [Google Dorks](https://www.exploit-db.com/google-hacking-database) – Google Dorks Hacking Database (Exploit-DB)
* [Shodan,](https://www.shodan.io) [Censys,](https://search.censys.io) [ZoomEye,](https://www.zoomeye.org) [Fofa,](https://fofa.info) [Netlas](https://netlas.io) – search engines for finding specific devices, and device types


## Assessment Methodologies
* [Information Gathering](assessment-methodologies/information-gathering.md)
* [Footprinting & Scanning](assessment-methodologies/footprinting.md)
* [Enumeration](assessment-methodologies/enumeration.md)
* [Vulnerability Assessment](assessment-methodologies/vulnerability-assessment.md)

## Host & Networking Auditing
* [System/Host Based Attacks](host-network-auditing/host-based-attacks.md)
* [Network-Based Attacks](host-network-auditing/network-based-attacks)
* [The Metasploit Framework (MSF)](host-network-auditing/msf.md)
* [Exploitation](host-network-auditing/exploitation.md)
* [Post-Exploitation](host-network-auditing/post-exploitation.md)

## Web Application Penetrartion Testing
