🎯 Besa Standard Library

Welcome to the Besa Standard Library. This site is a curated collection of high-impact penetration testing commands and techniques, refactored from raw notes into a standardized WADComs-compliant format.


🚀 The Pentest Lifecycle

The following sections organize our documentation according to the standard phases of a penetration testing engagement.

1. 🔍 Reconnaissance & OSINT

The initial phase of gathering intelligence on the target’s external attack surface.

2. 📡 Scanning & Enumeration

Identifying open ports, services, and hidden web content to find potential entry points.

3. ⚔️ Initial Access & Exploitation

Leveraging identified vulnerabilities to gain a foothold in the target network.

4. 🏰 Active Directory & Lateral Movement

Navigating the internal network, escalating privileges, and compromising the domain.

5. ⬆️ Privilege Escalation

Escalating from a low-privileged user to administrative or root access.

6. 🛠️ Post-Exploitation & Persistence

Maintaining access and moving files between the attacker and target systems.


🛠️ Usage Note

All commands in this library use the {{variable}} syntax (e.g., {{target_ip}}). When using these in the field, ensure you replace the placeholders with your actual target data.