Notes, research, and methodologies for becoming a better hacker. Knowledge should be free.
☆83Mar 28, 2026Updated last month
Alternatives and similar repositories for hacking-methodologyNotes
Users that are interested in hacking-methodologyNotes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆13Jul 18, 2024Updated last year
- ☆14Sep 25, 2022Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆11Aug 17, 2020Updated 5 years ago
- ☆20Dec 1, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆50Jul 8, 2025Updated 9 months ago
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- Check the Domain for Local Admin Access☆20Feb 20, 2025Updated last year
- A subset of CTF challenges I have made over the years.☆18Aug 4, 2022Updated 3 years ago
- OSCP Cheatsheet☆17Jun 14, 2023Updated 2 years ago
- Collected resources for OSWA preparation.☆26Jan 25, 2023Updated 3 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Pentest scriptkit for your copypasta☆14Feb 18, 2026Updated 2 months ago
- This is based on ZephyFoxy's .zshrc file. I added lolcat and some other fun stuff you might like. You still get the eth0, tun0. wlan0 an…☆15Apr 23, 2024Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Notes, Lab Commands and Vulnerability Information for BSCP Exam Prep☆57Jun 7, 2023Updated 2 years ago
- A command and control framework.☆54Dec 26, 2024Updated last year
- Malware Development Framework☆11Apr 13, 2024Updated 2 years ago
- These books are pulled from # List of Free Learning Resources [ certification exam. Includes summaries…☆67Nov 15, 2025Updated 5 months ago
- ☆64Mar 14, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Oct 10, 2024Updated last year
- Free Active Directory pentesting tool and Linux CLI for AD enumeration, BloodHound, Kerberoasting, ADCS, DCSync, and attack paths.☆267Apr 26, 2026Updated last week
- Penetration testing with shellcode codes☆28Jan 25, 2018Updated 8 years ago
- Formatify is a Burp Suite extension that instantly converts HTTP requests into multiple formats like cURL, Python, PowerShell, and more—s…☆31Sep 23, 2025Updated 7 months ago
- Welcome to the Sec+ 701 Study Guide repository! This collection provides materials for the CompTIA Security+ (SY0-701) exam, including at…☆17Nov 30, 2024Updated last year
- Custom exploits that I made for Hack The Box machines!☆35Aug 3, 2021Updated 4 years ago
- This is a repository containing code to generate a PowerShell payload to access PCs remotely. For more information check this out 👇👇👇☆16Mar 17, 2022Updated 4 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- Generate HID attack strings for Kali Nethunter☆12Mar 20, 2015Updated 11 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆12Apr 5, 2025Updated last year
- https://gitlab.com/kalilinux/nethunter/build-scripts/kali-nethunter-project☆13Nov 30, 2020Updated 5 years ago
- ☆20Jan 8, 2026Updated 3 months ago
- ☆13Jan 15, 2026Updated 3 months ago
- Malware Development☆10Sep 30, 2020Updated 5 years ago
- ☆43Jan 12, 2022Updated 4 years ago
- A tool that acts as an assistant for Reverse Engineering challenges in CTFs☆16Jan 5, 2021Updated 5 years ago