Skip to content

ItsNishi/Pentest-Guide

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🔓 Nishi's Penetration Testing Guide

Knowledge and methodology collected from real engagements, labs, and certifications. Built as a living reference -- not a course, not a blog, just what actually works.


Searchable dictionary of attacks and exploits across all categories -- web, network, Active Directory, wireless, and more. Start here if you know what you're looking for.


📂 Table of Contents

🛡️ OPSEC

Section Description
Fake Identity Sock puppets, anonymous accounts, fake personas
Browsing Securely Browsers, VPNs, search engines, extensions

🌐 Web Exploitation

Section Description
Overview & Methodology Recon, fingerprinting, attack methodology
Common Vulnerabilities SQLi, XSS, SSRF, IDOR, command injection, auth attacks
JavaScript Attacks Node.js exploitation, prototype pollution, Electron apps, npm supply chain
Tools & Wordlists Burp Suite, ffuf, sqlmap, nuclei, useful one-liners

🖥️ Systems (Under Construction)

Section Description
Windows Windows enumeration and exploitation
Linux Linux enumeration and exploitation

🏠 Lab Setup (Under Construction)

Section Description
Creating a HomeLab Building a practice environment

🚧 Roadmap

  • Active Directory attacks and methodology
  • Network pentesting (LLMNR, NTLM relay, pivoting)
  • Privilege escalation (Windows + Linux)
  • Post-exploitation and lateral movement
  • Wireless attacks
  • Reporting templates

Maintained by Nishi

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors