pwnwiki/ - The notes section of the pentesters mind.

This is a collection TTPs (tools, tactics, and procedures) for what to do after access has been gained to victim systems during the course of performing penetration/red team testing.

Live Online Copy:

You can find a copy of the project online at:

Offline Use:

This is the really cool thing about this wiki: when you do a git clone of it you get a full wiki on your local system. Do you work on a network that has no Internet access? We gotcha covered.

  1. Clone the repository or pull the archive (download zip) of the repo
  2. Open index.html
  3. Most modern browsers don't allow the access of local files from a locally loaded HTML file. On Windows you can use Mongoose Tiny or HFS to host the files locally. On OSX and Linux python -m SimpleHTTPServer seems to work just fine.

Referenced tools can be found here: (If they aren't built into the OS).

Submitting Content

We want/need your help! Please contribute to this project is via GitHub ( That allows us to get your project-ready content incorporated into the wiki fast. Check out the page for details on how to contribute.

We realize that not everyone can/wants to submit content via GitHub and that's cool. If your go-to content is not up here and you don't want to spend the time becoming a Git Jedi, just visit our Google Form. Due to the large amount of submissions and content, there may be a delay between your posting and us getting your content into the project. Thanks for your submissions and your patience!


If you would like to become a curator, please contact

gimmick:ForkMeOnGitHub ({ color: 'red', position: 'right' })

See more ...