PwnWiki.io - The notes section of the pentesters mind.
This is a collection TTPs (tools, tactics, and procedures) for what to do after access has been gained to victim systems during the course of performing penetration/red team testing.
Live Online Copy:
You can find a copy of the project online at: http://PwnWiki.io
Offline Use:
This is the really cool thing about this wiki: when you do a git clone
of it you get a full wiki on your local system. Do you work on a network that has no Internet access? We gotcha covered.
- Clone the repository or pull the archive (download zip) of the repo
- Open index.html
- Most modern browsers don't allow the access of local files from a locally loaded HTML file. On Windows you can use Mongoose Tiny or HFS to host the files locally. On OSX and Linux
python -m SimpleHTTPServer
seems to work just fine.
Referenced tools can be found here: https://github.com/mubix/post-exploitation (If they aren't built into the OS).
Submitting Content
We want/need your help! Please contribute to this project is via GitHub (https://github.com/pwnwiki/pwnwiki.github.io). That allows us to get your project-ready content incorporated into the wiki fast. Check out the https://github.com/pwnwiki/pwnwiki.github.io/wiki page for details on how to contribute.
We realize that not everyone can/wants to submit content via GitHub and that's cool. If your go-to content is not up here and you don't want to spend the time becoming a Git Jedi, just visit our Google Form. Due to the large amount of submissions and content, there may be a delay between your posting and us getting your content into the project. Thanks for your submissions and your patience!
Curators:
- @mubix gimmick:TwitterFollow
- @WebBreacher gimmick:TwitterFollow
- @tekwizz123 gimmick:TwitterFollow
- @jakx_ gimmick:TwitterFollow
- @TheColonial gimmick:TwitterFollow
- @Wireghoul gimmick:TwitterFollow
If you would like to become a curator, please contact [email protected]
gimmick:ForkMeOnGitHub ({ color: 'red', position: 'right' })