Cheat sheet
☆36Dec 16, 2019Updated 6 years ago
Alternatives and similar repositories for CheatSheets
Users that are interested in CheatSheets are comparing it to the libraries listed below
Sorting:
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆66Jan 31, 2020Updated 6 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆124Jul 26, 2019Updated 6 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 6 years ago
- Basic Bash Script to scrape all subdomains from crtsh in a single run☆19May 23, 2022Updated 3 years ago
- https://stackoverflow.com/questions/33052406/invalid-compressed-data-format-violated☆26Sep 13, 2020Updated 5 years ago
- Python module to get and analyze data from Binance very easily.☆25Feb 22, 2024Updated 2 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Apr 24, 2018Updated 7 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆84Oct 27, 2023Updated 2 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 6 years ago
- ☆11May 28, 2022Updated 3 years ago
- Dirty bash script to obtain hosts given an IP address☆35Jan 25, 2021Updated 5 years ago
- ☆15Oct 11, 2023Updated 2 years ago
- Recon tool for pen-tester's☆21Sep 9, 2021Updated 4 years ago
- ☆16Jun 22, 2020Updated 5 years ago
- Game of Thrones hacking CTF (Capture the flag)☆64Mar 7, 2025Updated 11 months ago
- Chameleon Wordlists☆15Sep 13, 2022Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- My cyber security notes.☆14Feb 22, 2025Updated last year
- Burp Bounty profiles compilation, feel free to contribute!☆147Sep 24, 2021Updated 4 years ago
- This repo will contain some basic pentest/RT commands.☆37Jun 2, 2022Updated 3 years ago
- ☆16Mar 11, 2024Updated last year
- Guidelines for writing secure code for Python developers.☆22Apr 23, 2017Updated 8 years ago
- Do bug hunting with One-Line script and get bounty☆18Jul 30, 2023Updated 2 years ago
- ☆19Apr 29, 2019Updated 6 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- ☆18Mar 13, 2022Updated 3 years ago
- CSbyGB - Gabrielle B's new Blog!☆23Jul 29, 2025Updated 7 months ago
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆39Jan 20, 2023Updated 3 years ago
- This repo contains resources that a beginner would need to get started in Web application penetration testing and bug hunting.☆18Jul 24, 2022Updated 3 years ago
- ☆28Oct 15, 2025Updated 4 months ago
- Swagger Directory Enumeration (SDE)☆21Jan 16, 2021Updated 5 years ago
- Script to check Kali Linux configs☆25Jan 14, 2019Updated 7 years ago
- Wingkalabs (Linux) Wingkalabs es una máquina Virtual Linux intencionalmente vulnerable. Esta máquina virtual se puede utilizar para real…☆22Mar 14, 2018Updated 7 years ago
- CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure☆95Feb 2, 2024Updated 2 years ago
- A Web-UI for subdomain enumeration (subfinder)☆56Jun 5, 2020Updated 5 years ago
- eLearnSecurity Web application Penetration Tester eXtreme (eWPTXv2)☆28Feb 6, 2024Updated 2 years ago
- Write-Ups for TryHackMe☆23May 15, 2021Updated 4 years ago