Shubham Gupta Signature

Red Team Cheatsheet

Interactive cheatsheet with categorized commands and techniques for penetration testing, ethical hacking, and security assessments.

How to use this cheatsheet

  1. Select a category from the options below to see available techniques
  2. Choose a specific area to see the relevant commands
  3. Copy commands by clicking the copy icon next to each command
  4. Search for specific commands using the search bar
  5. Use the Command Generator for step-by-step guidance based on your scenario

Note: All techniques should only be used on systems you own or have permission to test. Always ensure proper authorization.

Infrastructure

Network and system attacks for initial access

28 commands

Phishing

Email phishing attack techniques and frameworks

35 commands

Windows AD

Active Directory attacks and techniques

30 commands

Web Attacks

Web application testing techniques

18 commands

Post Exploitation

Post-exploitation techniques

21 commands

C2 Frameworks

Command and Control frameworks

16 commands

Cloud

Cloud attacks and techniques

15 commands

Select a category or search for commands

For educational purposes only. Always obtain proper authorization before testing.

Inspired by ired.team