A cheat sheet that contains common enumeration and attack methods for Mail Server.
☆41Oct 18, 2022Updated 3 years ago
Alternatives and similar repositories for Mail-Server-Attacks-Cheat-Sheet
Users that are interested in Mail-Server-Attacks-Cheat-Sheet are comparing it to the libraries listed below
Sorting:
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- AD concepts, attack surfaces and attack vectors notes, slides, video...☆16Dec 6, 2024Updated last year
- Get a number of your tweets from the Twitter API.☆13May 1, 2022Updated 3 years ago
- Recon tool for URLs discovery☆12Jun 19, 2024Updated last year
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- BurpSuite Extension for performing scan via CLI.☆14Dec 5, 2017Updated 8 years ago
- Learning material for completely newcomers in the field of BOFs☆14Apr 11, 2020Updated 5 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- Trends Website (URL) from Twitter hackers.☆113Updated this week
- NeXSS is a modern, self-hosted Blind XSS (Cross-Site Scripting) hunter and callback listener built with Next.js. It helps security resear…☆30Jan 14, 2026Updated last month
- This repo offers comprehensive information, necessary tools, and instructional videos for beginners in Android penetration testing, provi…☆22Jun 12, 2023Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- ADSI based SA tool☆17Apr 9, 2022Updated 3 years ago
- Overwrite MBR and add own custom message☆16Apr 1, 2020Updated 5 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Aug 21, 2023Updated 2 years ago
- Materials used in preperation for the BSCP certification from PortSwigger☆18Jan 28, 2022Updated 4 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆23May 1, 2022Updated 3 years ago
- ☆25Jun 2, 2023Updated 2 years ago
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆118Oct 9, 2025Updated 4 months ago
- ☆25Feb 11, 2024Updated 2 years ago
- GoWC - Wildcard cleaner for MassDNS☆24Jun 10, 2022Updated 3 years ago
- ☆23Mar 3, 2020Updated 6 years ago
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆35Jun 5, 2024Updated last year
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- Active Directory Penetration Testing for Red Teams☆58Oct 5, 2024Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- A tool for generating and detecting Unicode domains to identify phishing URLs, aimed at assisting cybersecurity professionals in recogniz…☆30Apr 29, 2025Updated 10 months ago
- ☆23Jun 30, 2021Updated 4 years ago
- CTF Writeups☆28Aug 15, 2024Updated last year
- ☆26Mar 3, 2022Updated 4 years ago
- my own 2fa bypass methodolgy☆28Sep 22, 2023Updated 2 years ago
- Awesome Privilege Escalation☆145Oct 18, 2022Updated 3 years ago
- ☆30Mar 2, 2023Updated 3 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆28Mar 22, 2022Updated 3 years ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 6 years ago
- XSS reflector vulnerabilities exploitation extended.☆27Jul 25, 2021Updated 4 years ago