Skip to content

Latest commit

 

History

History
40 lines (27 loc) · 2.62 KB

README.md

File metadata and controls

40 lines (27 loc) · 2.62 KB

PwnWiki.io - The notes section of the pentesters mind.

This is a collection TTPs (tools, tactics, and procedures) for what to do after access has been gained to victim systems during the course of performing penetration/red team testing.


Live Online Copy:

You can find a copy of the project online at: http://PwnWiki.io

Offline Use:

This is the really cool thing about this wiki: when you do a git clone of it you get a full wiki on your local system. Do you work on a network that has no Internet access? We gotcha covered.

  1. Clone the repository or pull the archive (download zip) of the repo
  2. Open index.html
  3. Most modern browsers don't allow the access of local files from a locally loaded HTML file. On Windows you can use Mongoose Tiny or HFS to host the files locally. On OSX and Linux python -m SimpleHTTPServer seems to work just fine or try the pypwnwiki.py script if you need to specify a particular network address or service port.

Referenced tools can be found here: https://github.com/mubix/post-exploitation (If they aren't built into the OS).


Submitting Content

We want/need your help! Please contribute to this project is via GitHub (https://github.com/pwnwiki/pwnwiki.github.io). That allows us to get your project-ready content incorporated into the wiki fast. Check out the Contribute Page for details on how to contribute.

Want to discuss PwnWiki.github.io content? Talk to us at the PwnWiki Google Form.

Issues can always be brought to our attention via the PwnWiki Issue Management page.

Thanks for your submissions and your patience!


Curators:

If you would like to become a curator, please contact [email protected]

gimmick:ForkMeOnGitHub ({ color: 'red', position: 'right' })