[
LazyHackers
]
_
Home
Plans
Courses
Certifications
Cheatsheets
Leaderboard
Tracker
Quiz
Login
Register
Home
Plans & Pricing
Courses
Certifications
Cheatsheets
Leaderboard
Tracker
Quiz
Login
Register
Interactive
Cheatsheets
Searchable command references for pentesting, CTF, and security research. Click any command to copy.
All
web-pentest
(7)
exploitation
(7)
active-directory
(6)
recon
(3)
network-pentest
(2)
mobile-pentest
(2)
privesc
(1)
forensics
(1)
cloud-pentest
(1)
active-directory
Impacket — Windows & Active Directory Attacks
Impacket Python library with tools for SMB, MSRPC, Kerberos, NTLM, WMI, and AD attacks.
56
Apr 2026
active-directory
NetExec (CrackMapExec) — AD Lateral Movement
NetExec (nxc) — the Swiss Army knife for Windows/AD lateral movement, credential spraying, and post-…
57
Apr 2026
active-directory
Responder — LLMNR/NBT-NS Poisoning
Responder poisons LLMNR, NBT-NS, and mDNS to capture NTLMv2 hashes from Windows hosts on the local n…
82
Apr 2026
active-directory
Mimikatz — Windows Credential Dumping
Mimikatz extracts plaintext passwords, hashes, PIN codes, and Kerberos tickets from Windows memory.
34
Apr 2026
active-directory
Kerbrute & Rubeus — Kerberos Attacks
Kerbrute for username enumeration and password spraying; Rubeus for full Kerberos attack toolkit.
45
Apr 2026
active-directory
BloodHound — Active Directory Attack Path Analysis
BloodHound maps Active Directory attack paths using graph theory to find privilege escalation routes…
41
Apr 2026
Cookies Notice
We use cookies to improve security, analytics and your experience.
Learn more
Accept
Close