HackTricks-wiki / hacktricksLinks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
☆9,893Updated this week
Alternatives and similar repositories for hacktricks
Users that are interested in hacktricks are comparing it to the libraries listed below
Sorting:
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,428Updated 2 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆17,570Updated this week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,477Updated last month
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,396Updated 7 months ago
- Monitor linux processes without root permissions☆5,452Updated 2 years ago
- HTTP parameter discovery suite.☆5,666Updated 3 months ago
- Fast web fuzzer written in Go☆14,028Updated last month
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,646Updated 7 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,362Updated last year
- A swiss army knife for pentesting networks☆8,732Updated last year
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,534Updated last month
- List of Awesome Red Teaming Resources☆7,251Updated last year
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,600Updated this week
- A script that you can run in the background!☆2,848Updated 10 months ago
- Linux privilege escalation auditing tool☆5,959Updated last year
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,610Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆14,328Updated last week
- Adversary Emulation Framework☆9,404Updated last week
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,191Updated 3 months ago
- Red Teaming Tactics and Techniques☆4,263Updated 9 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,100Updated 2 months ago
- A Tool for Domain Flyovers☆5,765Updated 3 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,215Updated last year
- A collection of custom security tools for quick needs.☆3,211Updated 2 years ago
- The ultimate WinRM shell for hacking/pentesting☆4,850Updated 5 months ago
- In-depth attack surface mapping and asset discovery☆13,027Updated last week
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆6,947Updated this week
- A fast, simple, recursive content discovery tool written in Rust.☆6,619Updated last month
- Top disclosed reports from HackerOne☆4,556Updated this week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,227Updated 8 months ago