Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
☆11,050Mar 18, 2026Updated this week
Alternatives and similar repositories for hacktricks
Users that are interested in hacktricks are comparing it to the libraries listed below
Sorting:
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,484Updated this week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,106Updated this week
- ☆732Mar 11, 2026Updated last week
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,816Mar 3, 2026Updated 2 weeks ago
- Fast web fuzzer written in Go☆15,750Apr 24, 2025Updated 10 months ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,492Updated this week
- Impacket is a collection of Python classes for working with network protocols.☆15,560Updated this week
- A swiss army knife for pentesting networks☆9,100Dec 6, 2023Updated 2 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,539Updated this week
- Red Teaming Tactics and Techniques☆4,509Aug 22, 2024Updated last year
- Monitor linux processes without root permissions☆5,927Mar 1, 2026Updated 2 weeks ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,352Mar 13, 2026Updated last week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,541Jan 18, 2026Updated 2 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,433Updated this week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,937Jan 28, 2026Updated last month
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,186Sep 29, 2025Updated 5 months ago
- Adversary Emulation Framework☆10,838Updated this week
- Trying to tame the three-headed dog.☆4,920Nov 14, 2025Updated 4 months ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,802Apr 25, 2024Updated last year
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆6,435May 1, 2025Updated 10 months ago
- In-depth attack surface mapping and asset discovery☆14,256Mar 13, 2026Updated last week
- A fast, simple, recursive content discovery tool written in Rust.☆7,606Feb 8, 2026Updated last month
- Collection of methodology and test case for various web vulnerabilities.☆7,049Jun 25, 2025Updated 8 months ago
- HTTP parameter discovery suite.☆6,142Feb 20, 2025Updated last year
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆12,058Updated this week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,384Updated this week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,510Nov 16, 2025Updated 4 months ago
- All about bug bounty (bypasses, payloads, and etc)☆6,665Sep 8, 2023Updated 2 years ago
- Fast passive subdomain enumeration tool.☆13,240Mar 11, 2026Updated last week
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,912Aug 17, 2020Updated 5 years ago
- game of active directory☆7,581Mar 12, 2026Updated last week
- Web path scanner☆14,084Updated this week
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,860Sep 6, 2023Updated 2 years ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,581Updated this week
- 🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.☆4,873Updated this week
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆6,101Aug 14, 2024Updated last year
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,244Mar 13, 2026Updated last week
- The all-in-one browser extension for offensive security professionals 🛠☆6,651Jan 5, 2025Updated last year
- Privilege Escalation Enumeration Script for Windows☆3,728Jan 30, 2026Updated last month