☆140Oct 23, 2022Updated 3 years ago
Alternatives and similar repositories for Wireless-Penetration-Testing
Users that are interested in Wireless-Penetration-Testing are comparing it to the libraries listed below
Sorting:
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34May 18, 2020Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆48Mar 30, 2021Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Nov 7, 2020Updated 5 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- Notes only☆19May 2, 2022Updated 3 years ago
- ☆346Oct 23, 2022Updated 3 years ago
- ☆210Oct 23, 2022Updated 3 years ago
- ☆248Oct 23, 2022Updated 3 years ago
- ☆348Dec 25, 2022Updated 3 years ago
- This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."☆724Jun 24, 2025Updated 8 months ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆483May 8, 2025Updated 9 months ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆472Oct 23, 2022Updated 3 years ago
- ☆439Oct 23, 2022Updated 3 years ago
- This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machine…☆862Oct 23, 2022Updated 3 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,462Nov 16, 2024Updated last year
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on…☆1,201Oct 23, 2022Updated 3 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- High quality and text versions of cheat sheets from Cyber Detective Twitter☆38May 1, 2024Updated last year
- ☆22Jun 19, 2025Updated 8 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficu…☆1,717Mar 24, 2023Updated 2 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.☆820Oct 23, 2022Updated 3 years ago
- A PowerShell script that simplifies life and therefore... phishing.☆20Aug 16, 2022Updated 3 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,542Feb 11, 2023Updated 3 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- HOCXSS (Cross Site Scripting)☆12May 7, 2020Updated 5 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Dec 29, 2025Updated 2 months ago
- Bash script to generate reverse shell payloads☆19Sep 9, 2023Updated 2 years ago
- GitHub Profile Repository for Kali☆14Updated this week
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆36Jul 11, 2023Updated 2 years ago
- unix_collector is a Live Response collection script for Incident Response on UNIX-like systems using native binaries. Supports AIX, Andro…☆41Jun 10, 2025Updated 8 months ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- A small project to bypass UAC in windows 10/8/7 using dll injection technique☆75Aug 17, 2020Updated 5 years ago
- SWF Vulnerability & Information Scanner☆18Nov 24, 2018Updated 7 years ago
- Automated rogue access point setup tool.☆204Apr 2, 2021Updated 4 years ago
- A curated list of Android Security materials and resources For Pentesters and Bug Hunters☆1,868May 5, 2025Updated 9 months ago