[
LazyHackers
]
_
Home
Plans
Courses
Certifications
Cheatsheets
Leaderboard
Tracker
Quiz
Login
Register
Home
Plans & Pricing
Courses
Certifications
Cheatsheets
Leaderboard
Tracker
Quiz
Login
Register
Interactive
Cheatsheets
Searchable command references for pentesting, CTF, and security research. Click any command to copy.
All
web-pentest
(7)
exploitation
(7)
active-directory
(6)
recon
(3)
network-pentest
(2)
mobile-pentest
(2)
privesc
(1)
forensics
(1)
cloud-pentest
(1)
exploitation
Netcat & Socat — Network Swiss Army Knife
Netcat and Socat for reverse shells, port forwarding, file transfer, and network debugging.
34
Apr 2026
exploitation
John the Ripper — Password Cracking
John the Ripper — versatile password cracker with hash extraction helpers for common file formats.
43
Apr 2026
exploitation
MSFVenom — Payload Generation
MSFVenom combines msfpayload and msfencode for generating custom shellcode and payloads.
38
Apr 2026
exploitation
Metasploit Framework — Exploitation
Metasploit Framework — the world's most used penetration testing framework for exploit development a…
30
Apr 2026
exploitation
Hashcat — Offline Password Cracking
Hashcat is the world's fastest password recovery tool supporting 300+ hash types and GPU acceleratio…
26
Apr 2026
exploitation
SearchSploit & ExploitDB — Exploit Discovery
SearchSploit — local ExploitDB search tool for finding and using publicly known exploits.
34
Apr 2026
exploitation
Hydra — Online Password Brute Force
Hydra is a fast, parallelized online password cracker supporting 50+ protocols.
33
Apr 2026
Cookies Notice
We use cookies to improve security, analytics and your experience.
Learn more
Accept
Close