HackTricks-wiki / hacktricksLinks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
☆10,740Updated this week
Alternatives and similar repositories for hacktricks
Users that are interested in hacktricks are comparing it to the libraries listed below
Sorting:
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,860Updated last month
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,484Updated 3 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,034Updated 3 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,075Updated 2 weeks ago
- A swiss army knife for pentesting networks☆9,023Updated 2 years ago
- Gather and update all available and newest CVEs with their PoC.☆7,491Updated this week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,236Updated last month
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,753Updated 7 months ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,034Updated last week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,408Updated last month
- Web application fuzzer☆6,372Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,775Updated 2 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,687Updated last year
- List of Awesome Red Teaming Resources☆7,694Updated 2 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,345Updated 2 years ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,312Updated last month
- Collection of methodology and test case for various web vulnerabilities.☆6,959Updated 6 months ago
- Red Teaming Tactics and Techniques☆4,467Updated last year
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,467Updated this week
- A Workflow Engine for Offensive Security☆6,024Updated 5 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,439Updated 9 months ago
- Impacket is a collection of Python classes for working with network protocols.☆15,308Updated this week
- Fast web fuzzer written in Go☆15,384Updated 8 months ago
- In-depth attack surface mapping and asset discovery☆13,981Updated this week
- Adversary Emulation Framework☆10,522Updated this week
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆5,064Updated this week
- The ultimate WinRM shell for hacking/pentesting☆5,203Updated this week
- Web path scanner☆13,818Updated 2 weeks ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,488Updated 2 years ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,483Updated last year