CompassSecurity / Hacking_Tools_Cheat_Sheet
☆722Updated last year
Alternatives and similar repositories for Hacking_Tools_Cheat_Sheet:
Users that are interested in Hacking_Tools_Cheat_Sheet are comparing it to the libraries listed below
- Reference guide for scanning networks with Nmap.☆597Updated 5 years ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆941Updated last year
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,283Updated 2 months ago
- ☆1,522Updated last year
- An organized list of resources including tools, blog-posts and how-to tutorials compiled and created by SCSP community members.☆432Updated 2 years ago
- A Python tool used to automate the execution of the following tools : Nmap , Nikto and Dirsearch but also to automate the report generati…☆291Updated 2 years ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆1,024Updated last week
- Red Teaming & Pentesting checklists for various engagements☆2,523Updated 5 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,753Updated 8 months ago
- Wireshark Cheat Sheet☆382Updated 4 years ago
- ☆1,630Updated this week
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆237Updated 4 years ago
- Some scripts useful for red team activities☆1,561Updated 3 years ago
- This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."☆669Updated last year
- This repository contains a curated list of resources I suggest on LinkedIn and Twitter.📝🌝☆626Updated 8 months ago
- Basics on commands/tools/info on how to assess the security of mobile applications☆1,519Updated last year
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆899Updated last year
- ☆2,187Updated last year
- Work in progress...☆679Updated 2 months ago
- 🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources☆1,408Updated 4 months ago
- Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 …☆976Updated last year
- Offensive Software Exploitation Course☆2,352Updated last year
- Collection of the cheat sheets useful for pentesting☆3,941Updated 11 months ago
- Dangerously fast DNS/network/port scanner☆894Updated 2 years ago
- My own OSCP guide☆820Updated 2 years ago
- A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.☆1,111Updated last year
- Awesome Vulnerable Applications☆1,071Updated 5 months ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆437Updated 2 years ago
- Collection of online security resources☆269Updated last year
- Mind-Maps of Several Things☆2,499Updated last year