Red Team Cheatsheet
Interactive cheatsheet with categorized commands and techniques for penetration testing, ethical hacking, and security assessments.
How to use this cheatsheet
- Select a category from the options below to see available techniques
- Choose a specific area to see the relevant commands
- Copy commands by clicking the copy icon next to each command
- Search for specific commands using the search bar
- Use the Command Generator for step-by-step guidance based on your scenario
Note: All techniques should only be used on systems you own or have permission to test. Always ensure proper authorization.
Infrastructure
Network and system attacks for initial access
28 commands
Phishing
Email phishing attack techniques and frameworks
35 commands
Windows AD
Active Directory attacks and techniques
30 commands
Web Attacks
Web application testing techniques
18 commands
Post Exploitation
Post-exploitation techniques
21 commands
C2 Frameworks
Command and Control frameworks
16 commands
Cloud
Cloud attacks and techniques
15 commands
Select a category or search for commands
For educational purposes only. Always obtain proper authorization before testing.
Inspired by ired.team