PentestH
  • Home
  • Cheat sheets
    • All
      • Cybersecurity acronyms
      • Linux commands
      • SSH commands
      • SQL commands
      • HTTP status codes
      • Passive recon
      • Google Dorking
      • Nmap
      • Ffuf
      • Nuclei
      • Security For Everyone
      • Nessus
      • Openvas
      • WPScan
      • Reverse shell
      • Metasploit
      • Linux PrivEsc
      • Hashcat hash modes
    • Fundamentals
    • Information gathering
    • Vulnerability assessment
    • Exploitation
    • Post-exploitation
  • Checklists
    • All
      • WSTG
      • Linux PrivEsc
    • Web security
    • Pentest
  • Services
  • About
Select Page

Pentest Help

Help for penetration testing

Pentest cheat sheets & Cybersecurity checklists

Pentest cheat sheets

  • All
  • Fundamentals
  • Information gathering
  • Vulnerability assessment
  • Exploitation
  • Post-exploitation
Cybersecurity acronyms

Cybersecurity acronyms

Fundamentals

Linux commands

Linux commands

Operation system, Fundamentals

SSH commands

SSH commands

Fundamentals

SQL commands

SQL commands

Fundamentals

HTTP status codes

HTTP status codes

Fundamentals

Passive recon

Passive recon

Information gathering

Google Dorking

Google Dorking

Webenum, Information gathering

Nmap

Nmap

Information gathering, Vulnerability assessment

Ffuf

Ffuf

Webenum, Information gathering

Nuclei

Nuclei

Vulnerability assessment

Security For Everyone

Security For Everyone

Vulnerability assessment, Coming soon

Nessus

Nessus

Vulnerability assessment

Openvas

Openvas

Vulnerability assessment

WPScan

WPScan

Vulnerability assessment, Wordpress

Reverse shell

Reverse shell

Exploitation

Metasploit

Metasploit

Exploitation, Post-exploitation

Linux PrivEsc

Linux PrivEsc

Post-exploitation

Hashcat hash modes

Hashcat hash modes

Exploitation, Post-exploitation

Cybersecurity checklists

  • All
  • Web security
  • Pentest
WSTG

WSTG

Web security

Linux PrivEsc

Linux PrivEsc

Pentest

Proton VPN

Privacy and encryption

Use the Proton VPN app on your desktop and mobile devices or install it as a browser extension. Available on all platforms, including Linux.
Get Proton VPN
Proton VPN

All cheat sheets

  • Cybersecurity acronyms
  • Linux commands
  • SSH commands
  • SQL commands
  • HTTP status codes
  • Passive recon
  • Google Dorking
  • Nmap
  • Ffuf
  • Nuclei
  • Security For Everyone
  • Nessus
  • Openvas
  • WPScan
  • Reverse shell
  • Metasploit
  • Linux PrivEsc
  • Hashcat hash modes

All checklists

  • WSTG
  • Linux PrivEsc

Privacy

  • Privacy Policy

© 2024-2025 Gubanyi Gabor PentestH | Email: info@pentesth.com | All rights reserved.