PIECE Logo
PIECE
Sign in

PIECE

Pentesting Interactive & Exhaustive Command Explorer - The critical piece for strategic clarity and control, unifying scattered commands into a coherent, actionable arsenal. Empowering security professionals with the tools they need to conduct thorough and efficient penetration tests.

Resources

  • Official Website
  • Contact Support
  • Pricing & Plans

CTF Competitions

  • Pentesting Cheatsheets
  • Pentesting Mindmaps
  • TAPE Framework
Privacy PolicyTerms of ServiceCookie Policy

© 2025 Mirachron. All rights reserved.

PIECE is designed for authorized security testing only. Users are responsible for ensuring they have proper authorization before conducting any penetration testing activities.

PIECE Logo

PIECE

The Decisive Element in Your Offensive Strategy.

PentestingInteractive&ExhaustiveCommandExplorer

Unifying scattered commands into a coherent, actionable arsenal. The critical piece for strategic clarity and control.

Browse CommandsSign In

Trusted by Security Professionals

0+Battle-Tested Commands
0+Attack Vectors
ZeroSetup Required
100%Built by Red Teamers
Interactive Design

Anatomy of a Command

Every command is packed with features designed to make your penetration testing workflow more efficient

SMB Domain Authentication

Category: Network
Topic: SMB
StageCredentialsContext
External EnumUser, PasswordLinux
Auth Required
External
smbmap -H $TGT_IP -u '$USER' -p '$PASS' -d $DOMAIN --no-banner

Description

Specifies a Windows domain when authenticating to enumerate shares, which may be required if the server enforces domain membership checks.

Detailed Explanation

Specifies a Windows domain when authenticating to enumerate shares, which may be required if the server enforces domain membership checks.

Essential when dealing with large AD environments or segmented infrastructure.

Combine with -r to immediately begin exploring shares after authentication.

Example:

smbmap -H 10.10.10.5 -u 'jdoe' -p 'Spring2024!' -d 'CORP' --no-banner

Command Anatomy

Category & Topic Filter

Organized by categories and topics with context-specific filters

Context Information

See stage, credentials required, and execution environment

Command Syntax

The actual command with dynamic placeholders

Dynamic Placeholders

Replace variables like IP addresses and credentials across all commands

Quick Description

Concise explanation of what the command does

Detailed Explanation

In-depth guide with usage examples and technical details

One-Click Copy

Copy commands with your placeholder values automatically inserted

Powerful Features

Built for Security Professionals

Tools and features designed by penetration testers for penetration testers

Smart Placeholders

Predefined placeholders for common values like IP addresses and credentials that update in real-time across all commands.

Advanced Filtering

Filter by protocol, OS, credentials, and attack stage to find exactly what you need for your specific engagement.

Comprehensive Library

Over 1,500 commands across multiple categories covering the entire penetration testing lifecycle from reconnaissance to post-exploitation.

One-Click Copy

Copy commands with your custom placeholders automatically inserted, ready to paste into your terminal.

Attack Maps

Visualize attack paths and techniques with interactive mindmaps to plan your penetration testing approach.

Coming Soon

Progress Tracking

Track your penetration testing progress and document findings with integrated reporting tools.

Coming Soon
Dual Functionality

Two Tools in One

Command library for quick reference and attack maps for visualizing your approach

Command Library

Available Now

Interactive commands with placeholders, filtering, and one-click copying for efficient penetration testing.

Browse Commands

Attack Maps

In Development

Visualize attack paths and techniques to plan your penetration testing approach with interactive mindmaps.

Organized Content

Specialized Command Categories

Organized by technique and service for quick access during engagements

Network

Network

18 topics740 commands
Windows

Windows

2 topics234 commands
Linux

Linux

10 topics386 commands
Web

Web

0 topics0 commands
Cloud

Cloud

0 topics0 commands
Container

Container

0 topics0 commands
Explore All Commands
Access Levels

Choose Your Access Level

Our tiered system is built for learners, professionals, and teams looking to level up their penetration testing workflow

Preview Access
No account required
Access first 10% of commands per topic
View short descriptions and raw commands
Use basic filtering (by topic and stage)
Copy available commands with placeholder logic
Browse Preview
Free Account
Registration required
Expanded access to free command set
View complete command details and descriptions
Enable placeholder replacement and highlighting
Access to full filter system
Join Discord (free-tier channel access)
Command anchor links for easy sharing
Create Free Account
Premium
Professional access
Access to 75% of all commands
Unlock premium-only command sets
Save and star frequently used commands
Submit custom commands for review
View "Coming Soon" command entries
Gain insights via platform usage statistics
Subscribe to Premium
MOST POPULAR
Elite
Full unrestricted access
100% access to all commands, topics, and descriptions
Full access to mindmap nodes, including elite-only content
Export commands in Markdown or Word formats
Access to "In Development" commands
View personal usage history and starred commands
Command search with deep filtering and cross-referencing
Early access to new tools, techniques, and features
Subscribe to Elite

15% discount available for veterans and students.Learn more

View Full Feature Comparison
Get Started Today

Ready to Level Up Your Security Testing?

Join security professionals who rely on PIECE for their penetration testing toolkit.

Browse CommandsSign InView Pricing