☆154Mar 14, 2026Updated last week
Alternatives and similar repositories for Wireless-Penetration-Testing
Users that are interested in Wireless-Penetration-Testing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆50Mar 30, 2021Updated 4 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆36May 18, 2020Updated 5 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆85Nov 7, 2020Updated 5 years ago
- Notes only☆20May 2, 2022Updated 3 years ago
- This repository contains the files that provide the upload functionality in the IIS Server☆36Aug 4, 2021Updated 4 years ago
- ☆354Mar 14, 2026Updated last week
- ☆257Mar 14, 2026Updated last week
- ☆212Mar 14, 2026Updated last week
- ☆358Mar 14, 2026Updated last week
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆493Mar 14, 2026Updated last week
- This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."☆754Mar 14, 2026Updated last week
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆473Mar 14, 2026Updated last week
- This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machine…☆865Mar 14, 2026Updated last week
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,488Mar 14, 2026Updated last week
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on…☆1,206Oct 23, 2022Updated 3 years ago
- ☆24Jun 19, 2025Updated 9 months ago
- High quality and text versions of cheat sheets from Cyber Detective Twitter☆39May 1, 2024Updated last year
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.☆824Mar 14, 2026Updated last week
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficu…☆1,762Mar 14, 2026Updated last week
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,568Mar 14, 2026Updated last week
- A PowerShell script that simplifies life and therefore... phishing.☆20Aug 16, 2022Updated 3 years ago
- CVE-2022-1040☆17Sep 25, 2022Updated 3 years ago
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,771Mar 14, 2026Updated last week
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆14Dec 14, 2019Updated 6 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- A small project to bypass UAC in windows 10/8/7 using dll injection technique☆75Aug 17, 2020Updated 5 years ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- HOCXSS (Cross Site Scripting)☆12May 7, 2020Updated 5 years ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- A curated list of Android Security materials and resources For Pentesters and Bug Hunters☆1,881Mar 3, 2026Updated 2 weeks ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆15Jun 7, 2024Updated last year
- A comprehensive OSINT (Open Source Intelligence) script that gathers detailed information about a target domain using various public sour…☆18May 19, 2024Updated last year
- A MITRE ATT&CK Lookup Tool☆46Apr 25, 2024Updated last year