1. Introduction
  2. 1. Foodprinting and Reconnaissances
  3. Checklist
  4. 2. Android Penetration Testing
  5. 3. Web Application
  6. 4. Report Writing
  7. 5. Bug Bounty Tools
  8. Recon
  9. 6. Public info gathering
  10. 7. Root domains
  11. 8. Subdomain Enum
  12. 9. Subdomain Takeover
  13. 10. Webs recon
  14. 11. Network Scanning
  15. 12. Host Scanning
  16. 13. Packet Scanning
  17. Enumeration
  18. 14. Files
  19. 15. SSL/TLS
  20. 16. Ports
  21. Section
  22. 17. Exploitation
  23. 18. Post-exploitation
  24. 19. Mobile
  25. 20. Recon
  26. 21. Exploiting
  27. 22. Enumeration
    1. 22.1. File analysis
    2. 22.2. Ports
    3. 22.3. Web
    4. 22.4. Web services
    5. 22.5. Cloud
  28. Web
  29. 23. Web Attacks
  30. 24. General Info
  31. 25. Quick tricks
  32. 26. Header injections
  33. 27. Bruteforcing
  34. 28. Online hashes cracked
  35. 29. Crawl/Fuzz
  36. 30. LFI/RFI
  37. 31. File upload
  38. 32. SQLi
  39. 33. SSRF
  40. 34. Open redirects
  41. 35. XSS
  42. 36. CSP
  43. 37. XXE
  44. 38. Cookie Padding
  45. 39. Webshells
  46. 40. CORS
  47. 41. CSRF
  48. 42. Web Cache Poisoning
  49. 43. Broken Links
  50. 44. Clickjacking
  51. 45. HTTP Request Smuggling
  52. 46. Web Sockets
  53. 47. CRLF
  54. 48. IDOR
  55. 49. Web Cache Deception
  56. 50. Session fixation
  57. 51. Email attacks
  58. 52. Pastejacking
  59. 53. HTTP Parameter pollution
  60. 54. SSTI
  61. 55. Prototype Pollution
  62. 56. Command Injection
  63. 57. Deserialization
  64. 58. DNS rebinding
  65. Web-Service
  66. 59. Browser Extension
  67. 60. Web Technologies
  68. 61. APIs
  69. 62. JS
  70. 63. ASP.NET
  71. 64. JWT
  72. 65. GitHub
  73. 66. GitLab
  74. 67. WAFs
  75. 68. Firebird
  76. 69. Wordpress
  77. 70. WebDav
  78. 71. Joomla
  79. 72. Jenkins
  80. 73. IIS
  81. 74. VHosts
  82. 75. Firebase
  83. 76. OWA
  84. 77. OAuth
  85. 78. Flask
  86. 79. Symfony && Twig
  87. 80. Drupal
  88. 81. NoSQL (MongoDB, CouchDB)
  89. 82. PHP
  90. 83. RoR (Ruby on Rails)
  91. 84. JBoss - Java Deserialization
  92. 85. OneLogin - SAML Login
  93. 86. Flash SWF
  94. 87. Nginx
  95. 88. Python
  96. 89. Tomcat
  97. 90. Adobe AEM
  98. 91. Magento
  99. 92. SAP
  100. 93. MFA
  101. 94. GWT
  102. 95. Jira
  103. 96. OIDC (Open ID Connect)
  104. 97. ELK
  105. 98. Sharepoint
  106. 99. Others
  107. Cloud
  108. 100. Cloud
  109. 101. General
  110. 102. Cloud Info Gathering
  111. 103. AWS
  112. 104. Azure
  113. 105. GCP
  114. 106. Docker && Kubernetes
  115. 107. CDN - Comain Fronting
  116. Exploitation
  117. 108. Payloads
  118. 109. Reverse Shells
  119. 110. File transfer
  120. Post-Exploitation
  121. 111. Linux
  122. 112. Pivoting
  123. 113. Windows
  124. 114. AD
    1. 114.1. Kerberos
  125. 115. PS tips & tricks
  126. Mobile
  127. 116. General
  128. 117. Android
  129. 118. iOS
  130. Others
  131. 119. Burp Suite
  132. 120. Password cracking
  133. 121. VirtualBox
  134. 122. Code review
  135. 123. Pentesting Web checklist
  136. 124. Internal Pentest
  137. 125. Web fuzzers review
  138. 126. Recon suites review
  139. 127. Subdomain tools review
  140. 128. Random
  141. 129. Master assessment mindmaps
  142. 130. BugBounty
  143. 131. Exploiting
  144. 132. tools everywhere

Checklist

Cloud

  • General
  • AWS
  • Azure
  • Google Cloud Platform
  • Cloud Info Gathering
  • Docker && Kubernetes
  • CDNs