PwnWiki.io - The notes section of the pentesters mind.
This is a collection TTPs (tools, tactics, and procedures) for what to do after access has been gained to victim systems during the course of performing penetration/red team testing.
You can find a copy of the project online at: http://PwnWiki.io
This is the really cool thing about this wiki: when you do a git clone
of it you get a full wiki on your local system. Do you work on a network that has no Internet access? We gotcha covered.
- Clone the repository or pull the archive (download zip) of the repo
- Open index.html
- Most modern browsers don't allow the access of local files from a locally loaded HTML file. On Windows you can use Mongoose Tiny or HFS to host the files locally. On OSX and Linux
python -m SimpleHTTPServer
seems to work just fine or try thepypwnwiki.py
script if you need to specify a particular network address or service port.
Referenced tools can be found here: https://github.com/mubix/post-exploitation (If they aren't built into the OS).
We want/need your help! Please contribute to this project is via GitHub (https://github.com/pwnwiki/pwnwiki.github.io). That allows us to get your project-ready content incorporated into the wiki fast. Check out the Contribute Page for details on how to contribute.
Want to discuss PwnWiki.github.io content? Talk to us at the PwnWiki Google Form.
Issues can always be brought to our attention via the PwnWiki Issue Management page.
Thanks for your submissions and your patience!
- @mubix gimmick:TwitterFollow
- @WebBreacher gimmick:TwitterFollow
- @tekwizz123 gimmick:TwitterFollow
- @jakx_ gimmick:TwitterFollow
- @TheColonial gimmick:TwitterFollow
- @Wireghoul gimmick:TwitterFollow
If you would like to become a curator, please contact [email protected]
gimmick:ForkMeOnGitHub ({ color: 'red', position: 'right' })