Pentest Book
search
⌘Ctrlk
Pentest Book
  • /home/six2dez/.pentest-book
  • Contribute/Donatearrow-up-right
  • Recon
    • Public info gathering
    • Root domains
    • Subdomain Enum
    • Webs recon
    • Network Scanning
    • Host Scanning
    • Packet Scanning
  • Enumeration
    • Files
    • SSL/TLS
    • Ports
    • Web Attacks
    • Web Technologies
    • Cloud
      • General
      • Cloud Info Gathering
      • AWS
      • Azure
      • GCP
      • Docker && Kubernetes
      • Serverless Security
      • CDN - Comain Fronting
      • Cloud AI Security
      • K8s Admission Bypass
  • Exploitation
    • Payloads
    • Reverse Shells
    • File transfer
    • Privilege Escalation
    • Buffer Overflow
    • Web Exploits & C2
    • Linux Kernel Exploits
    • Modern C2 Frameworks
  • Post Exploitation
    • Linux
    • macOS
    • Pivoting
    • Windows
  • Mobile
    • General
    • Android
    • iOS
  • Others
    • Burp Suite
    • Password cracking
    • VirtualBox
    • LLM/AI/ML/prompt testing
    • Code review
    • Pentesting Web checklist
    • Internal Pentest
    • Web fuzzers review
    • Recon suites review
    • Subdomain tools review
    • Random
    • Master assessment mindmaps
    • BugBounty
    • Exploiting
    • tools everywhere
    • RT/EDR
    • Wireless Testing
    • Social Engineering
    • Reporting
    • Hardware Hacking
    • Purple Team
    • IoT Protocols
    • Automotive Security
    • WebAuthn & Passkeys
    • Browser Extension Security
    • Tool Index
    • Attack Index
    • Wordlist Reference
    • Learning Path
    • Lab Setup Guide
    • Automation & Scripting
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. Enumeration

Cloud

  • General

  • AWS

  • Azure

  • Google Cloud Platform

  • Cloud Info Gathering

  • Docker && Kubernetes

  • CDNs

PreviousOtherschevron-leftNextGeneralchevron-right

Last updated 2 years ago

Was this helpful?

Was this helpful?