Cheat sheet
☆37Dec 16, 2019Updated 6 years ago
Alternatives and similar repositories for CheatSheets
Users that are interested in CheatSheets are comparing it to the libraries listed below
Sorting:
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆66Jan 31, 2020Updated 6 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆124Jul 26, 2019Updated 6 years ago
- Powershell crazy and sometimes diabolic scripts☆161Aug 26, 2020Updated 5 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆84Oct 27, 2023Updated 2 years ago
- Dirty bash script to obtain hosts given an IP address☆35Jan 25, 2021Updated 5 years ago
- Basic Bash Script to scrape all subdomains from crtsh in a single run☆19May 23, 2022Updated 3 years ago
- PowerShell Empire mod to post-exploit the World!☆136Oct 7, 2018Updated 7 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Apr 24, 2018Updated 7 years ago
- Python module to get and analyze data from Binance very easily.☆25Mar 14, 2026Updated last week
- https://stackoverflow.com/questions/33052406/invalid-compressed-data-format-violated☆26Sep 13, 2020Updated 5 years ago
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆39Jan 20, 2023Updated 3 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- Utility that can be used to decrypt HPQPswd encrypted passwords.☆44Jan 28, 2023Updated 3 years ago
- Burp Bounty profiles compilation, feel free to contribute!☆149Sep 24, 2021Updated 4 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- Backdoor en powershell vía Telegram☆30Mar 30, 2017Updated 8 years ago
- ☆13Jul 13, 2023Updated 2 years ago
- Mobile Pentesting Guide (WIP)☆26May 13, 2020Updated 5 years ago
- ☆21Apr 14, 2017Updated 8 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- Wingkalabs (Linux) Wingkalabs es una máquina Virtual Linux intencionalmente vulnerable. Esta máquina virtual se puede utilizar para real…☆22Mar 14, 2018Updated 8 years ago
- CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure☆95Feb 2, 2024Updated 2 years ago
- WEB API fuzzing☆23Apr 30, 2025Updated 10 months ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- Script to check Kali Linux configs☆25Jan 14, 2019Updated 7 years ago
- Chameleon Wordlists☆15Sep 13, 2022Updated 3 years ago
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- ☆14May 22, 2024Updated last year
- A simple dumper as FreshyCalls' PoC. That's what's trendy, isn't it? ¯\_(ツ)_/¯☆38Dec 13, 2020Updated 5 years ago
- Do bug hunting with One-Line script and get bounty☆18Jul 30, 2023Updated 2 years ago
- ☆37Jun 27, 2020Updated 5 years ago
- ☆17Jun 15, 2025Updated 9 months ago
- Ultimate File Transfer List☆68Sep 20, 2022Updated 3 years ago
- ☆251May 25, 2021Updated 4 years ago
- ☆16Jun 22, 2020Updated 5 years ago
- A Web-UI for subdomain enumeration (subfinder)☆55Jun 5, 2020Updated 5 years ago