Since it is hard as well as no point to remember the tons of commands use to penetrate ,this sheet can be used as reference . ##Dos-Attacks with Slowloris ##Information Gathering ##Nikto Webserver Scanner ##ARP spoofing ##Capturing cookies ##WPA cracking ##cracking WEP Auth ##Deauthentication Attack ##DNS spoofing ##Fake Authentication ##FTP exploitation ##Database hacking ##Injecting packets ##JS injection ##MITMF attack ##web server hacking ##Wireshark sniffing spoofing Checkout some more hacking scripts SECURING SYSTEM BLUETOOTH ATTACKS STEALING AND SNIFFING ATTACKS KALI LINUX HACKING COMMANDS CHEATSHEET TROJAN AND BACKDOORS DICTIONARY AND BURTEFORCING ATTACKS MAN IN THE MIDDLE ATTACKS ...