My own personal hacking notes.
☆37Sep 4, 2018Updated 7 years ago
Alternatives and similar repositories for My-Personal-Hacking-Notes
Users that are interested in My-Personal-Hacking-Notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Apr 14, 2021Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Oct 18, 2020Updated 5 years ago
- ☆14Sep 1, 2024Updated last year
- 🛠️ In this repository you will find all the OSCP tools I created and used during the course. 🛠️☆13Dec 23, 2023Updated 2 years ago
- Literally spray blind xss payloads everywhere.☆26Feb 22, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆11Oct 7, 2022Updated 3 years ago
- This repo will contain some basic pentest/RT commands.☆37Jun 2, 2022Updated 3 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- My set of notes and resources for Microsoft and other exams☆15Oct 20, 2021Updated 4 years ago
- Notes only☆20May 2, 2022Updated 3 years ago
- 💣 Dockerized penetration-testing/bugbounty/app-sec testing environment☆33Nov 24, 2021Updated 4 years ago
- An educational Linux Kernel Rootkit☆33Oct 3, 2021Updated 4 years ago
- Generic plugin based web application security fuzzing for anomalies by Slándáil Research Limited☆13Feb 13, 2024Updated 2 years ago
- Windows Privilege Escalation (Modified RottePotato)☆13Jun 5, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆19Feb 29, 2020Updated 6 years ago
- Quick and dirty script to check for No RL☆31Feb 18, 2025Updated last year
- Bypass UAC by abusing shell protocol handlers☆14Jul 12, 2021Updated 4 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- Generates target specific word lists for Fuzzing with fuff☆113Sep 2, 2020Updated 5 years ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆19Feb 15, 2020Updated 6 years ago
- Collects Docker container runtime metrics☆20Nov 7, 2022Updated 3 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆36May 18, 2020Updated 5 years ago
- Noob Penetration tester☆11Jul 17, 2025Updated 8 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Simple remote administration tool. Written in c++ and MASM.☆18May 16, 2018Updated 7 years ago
- Autorev.sh generates reverse shell codes for reverse shell . Supports linux and windows☆17Apr 8, 2022Updated 4 years ago
- Tool to search possible emails indexed throught API's Hunter.io (https://hunter.io)☆31May 22, 2023Updated 2 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- A simple way of sending messages from the CLI output to your Slack with webhook.☆116Dec 13, 2023Updated 2 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- ☆13Jul 12, 2021Updated 4 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Jan 25, 2017Updated 9 years ago
- Python library and CLI for the Bug Bounty Recon API☆230Jun 5, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- All you need about Active Directory☆16Jul 22, 2021Updated 4 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Dec 6, 2020Updated 5 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Apr 16, 2021Updated 4 years ago
- Code with Windows Hacker☆12Oct 14, 2022Updated 3 years ago
- ☆34Oct 1, 2019Updated 6 years ago