A collection of cheat sheets for all things security.
☆16Oct 31, 2021Updated 4 years ago
Alternatives and similar repositories for SecSheets
Users that are interested in SecSheets are comparing it to the libraries listed below
Sorting:
- ☆17Updated this week
- Payload Skills to assist AI agents☆33Jan 28, 2026Updated last month
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- is-pwned — Utility to safely check the HaveIBeenPwned "Pwned Passwords" database in the browser.☆14Jul 19, 2023Updated 2 years ago
- Linux Remote Process Injection and Hooking Example - htop☆12Apr 30, 2021Updated 4 years ago
- Burpsuite Extension for Jsmon☆22Feb 5, 2026Updated last month
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- Agentic Pentesting MCP server that discovers, exploits, and reports web application vulnerabilities.☆34Feb 22, 2026Updated last week
- Scanner to send specially crafted requests and catch callbacks of systems that are impacted by log4j log4shell vulnerability and to detec…☆12Feb 15, 2022Updated 4 years ago
- A code security platform based on fortify sca windows☆15Mar 6, 2019Updated 7 years ago
- ☆16Oct 24, 2018Updated 7 years ago
- Extract data from a .git directory.☆15Mar 28, 2023Updated 2 years ago
- Cisco CallManager User Enumeration☆15Aug 16, 2022Updated 3 years ago
- A list of resources to build a information security team.☆13Feb 10, 2021Updated 5 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Dec 27, 2021Updated 4 years ago
- Kiddy - (linux) kernel identity spoofer☆15Mar 18, 2024Updated last year
- Burp Suite Extension useful to inspect UPnP security☆16Nov 9, 2021Updated 4 years ago
- Monitor internet facing resource for open ports #Blueteam☆14Apr 7, 2020Updated 5 years ago
- ☆17Feb 15, 2025Updated last year
- Vulnerability scanner for Spring4Shell (CVE-2022-22965)☆12Apr 7, 2022Updated 3 years ago
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to …☆12Jan 1, 2024Updated 2 years ago
- 4000 security reports transformed to Skills you can use with Claude Code / Gemini CLI etc☆41Dec 9, 2025Updated 2 months ago
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Aug 4, 2023Updated 2 years ago
- software asset scanning orchestration system☆34Updated this week
- CVE-2023-21742 Poc☆14Apr 7, 2023Updated 2 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- Using Python 3 to programmatically combine vocabulary lists from the National Institute of the Korean Language and TOPIK, outputting to T…☆16Mar 28, 2025Updated 11 months ago
- JitterBug passively searches for Basic Info, open ports, potential CVE's on the given Target IP in third party databases without Direct i…☆13Sep 29, 2021Updated 4 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- A dynamic cross-site scripting (XSS) payload delivery system with team server abilities.☆16Feb 21, 2024Updated 2 years ago
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- pSlip is an Android static analysis tool kit designed to find potentially vulnerable escalation paths by analyzing exported components, i…☆26Jan 24, 2026Updated last month
- Emulate native integer and floating-point types in Python☆20May 15, 2023Updated 2 years ago
- ☆20Jul 19, 2021Updated 4 years ago
- Intentionally vulnerable Ruby on Rails web application for learning purposes☆17Sep 11, 2009Updated 16 years ago
- Exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆15Jan 21, 2023Updated 3 years ago
- A powerful static analysis tool that uses AI to scan Android APK files for security vulnerabilities and potential issues. The scanner dec…☆27Apr 6, 2025Updated 11 months ago