I got tired of juggling 15 browser tabs during engagements, so I built this
There's a specific kind of frustration that happens mid-engagement. You know what you're looking at. You've seen SeImpersonatePrivilege So you open HackTricks. Then a blog post someone bookmarked on The information was never the problem. It exists everywhere. That's what I built OpsecAtlas to fix. It's a free, open-source penetration testing reference that The coverage spans eight areas: the full PT lifecycle from Each section follows the same logic. A decision tree first, Most references are built to be comprehensive. This one is The Active Directory section opens with a single decision tree The Linux privesc section starts with an escalation priority The Windows section opens with the first commands you run There is also a reference hub that organizes the most important It runs as a PWA. Install it once from any browser and the The linked external platforms still need internet. But your MIT licensed. No tracking. No subscription. You can also fork it and load your own methodology notes into Live site: msk3d0ut.github.io/opsec-atlas github.com/msk3d0ut/opsec-atlas Built it because I needed it. If it saves you time during prep or on an actual engagement, a star helps other people find it.
