PIECE
The Decisive Element in Your Offensive Strategy.
PentestingInteractive&ExhaustiveCommandExplorer
Unifying scattered commands into a coherent, actionable arsenal. The critical piece for strategic clarity and control.
Trusted by Security Professionals
Anatomy of a Command
Every command is packed with features designed to make your penetration testing workflow more efficient
SMB Domain Authentication
Stage | Credentials | Context |
---|---|---|
External Enum | User, Password | Linux |
Auth Required External |
smbmap -H $TGT_IP -u '$USER' -p '$PASS' -d $DOMAIN --no-banner
Description
Specifies a Windows domain when authenticating to enumerate shares, which may be required if the server enforces domain membership checks.
Detailed Explanation
Specifies a Windows domain when authenticating to enumerate shares, which may be required if the server enforces domain membership checks.
Essential when dealing with large AD environments or segmented infrastructure.
Combine with -r
to immediately begin exploring shares after authentication.
Example:
smbmap -H 10.10.10.5 -u 'jdoe' -p 'Spring2024!' -d 'CORP' --no-banner
Command Anatomy
Category & Topic Filter
Organized by categories and topics with context-specific filters
Context Information
See stage, credentials required, and execution environment
Command Syntax
The actual command with dynamic placeholders
Dynamic Placeholders
Replace variables like IP addresses and credentials across all commands
Quick Description
Concise explanation of what the command does
Detailed Explanation
In-depth guide with usage examples and technical details
One-Click Copy
Copy commands with your placeholder values automatically inserted
Built for Security Professionals
Tools and features designed by penetration testers for penetration testers
Smart Placeholders
Predefined placeholders for common values like IP addresses and credentials that update in real-time across all commands.
Advanced Filtering
Filter by protocol, OS, credentials, and attack stage to find exactly what you need for your specific engagement.
Comprehensive Library
Over 1,500 commands across multiple categories covering the entire penetration testing lifecycle from reconnaissance to post-exploitation.
One-Click Copy
Copy commands with your custom placeholders automatically inserted, ready to paste into your terminal.
Attack Maps
Visualize attack paths and techniques with interactive mindmaps to plan your penetration testing approach.
Progress Tracking
Track your penetration testing progress and document findings with integrated reporting tools.
Two Tools in One
Command library for quick reference and attack maps for visualizing your approach
Command Library
Interactive commands with placeholders, filtering, and one-click copying for efficient penetration testing.
Browse CommandsAttack Maps
Visualize attack paths and techniques to plan your penetration testing approach with interactive mindmaps.
Specialized Command Categories
Organized by technique and service for quick access during engagements
Choose Your Access Level
Our tiered system is built for learners, professionals, and teams looking to level up their penetration testing workflow
15% discount available for veterans and students.Learn more
Ready to Level Up Your Security Testing?
Join security professionals who rely on PIECE for their penetration testing toolkit.