Notes, research, and methodologies for becoming a better hacker. Knowledge should be free.
☆77Mar 16, 2026Updated last week
Alternatives and similar repositories for hacking-methodologyNotes
Users that are interested in hacking-methodologyNotes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆11Jul 18, 2024Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- ☆19Dec 1, 2025Updated 3 months ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆50Jul 8, 2025Updated 8 months ago
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- OSCP Cheatsheet☆17Jun 14, 2023Updated 2 years ago
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆160Updated this week
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- Collected resources for OSWA preparation.☆26Jan 25, 2023Updated 3 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Pentest scriptkit for your copypasta☆14Feb 18, 2026Updated last month
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- This is based on ZephyFoxy's .zshrc file. I added lolcat and some other fun stuff you might like. You still get the eth0, tun0. wlan0 an…☆15Apr 23, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Attack/Defense services for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆14Oct 24, 2024Updated last year
- A command and control framework.☆54Dec 26, 2024Updated last year
- Malware Development Framework☆11Apr 13, 2024Updated last year
- ☆29May 16, 2023Updated 2 years ago
- ☆12Apr 20, 2025Updated 11 months ago
- All knowledge I gained from CTFs, real life penetration testing and learning by myself.☆161Feb 14, 2026Updated last month
- This Repository contains my CRTP cum Red Teaming Active Directory attack and Defence preparation notes.☆81Jan 31, 2025Updated last year
- A collection of study notes and resources for the Offensive Security Certified Professional (OSCP) certification exam. Includes summaries…☆66Nov 15, 2025Updated 4 months ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆12Oct 10, 2024Updated last year
- Penetration testing with shellcode codes☆28Jan 25, 2018Updated 8 years ago
- Formatify is a Burp Suite extension that instantly converts HTTP requests into multiple formats like cURL, Python, PowerShell, and more—s…☆30Sep 23, 2025Updated 6 months ago
- Welcome to the Sec+ 701 Study Guide repository! This collection provides materials for the CompTIA Security+ (SY0-701) exam, including at…☆17Nov 30, 2024Updated last year
- Custom exploits that I made for Hack The Box machines!☆35Aug 3, 2021Updated 4 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- This is a repository containing code to generate a PowerShell payload to access PCs remotely. For more information check this out 👇👇👇☆16Mar 17, 2022Updated 4 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-project☆13Nov 30, 2020Updated 5 years ago
- ☆40Jan 12, 2022Updated 4 years ago
- ☆19Jan 8, 2026Updated 2 months ago
- ☆13Jan 15, 2026Updated 2 months ago
- Malware Development☆10Sep 30, 2020Updated 5 years ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆167Jul 16, 2023Updated 2 years ago
- ☆11Dec 8, 2023Updated 2 years ago