Ignitetechnologies / myfiles
Notes only
☆18Updated 3 years ago
Alternatives and similar repositories for myfiles
Users that are interested in myfiles are comparing it to the libraries listed below
Sorting:
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34Updated 4 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Updated 5 years ago
- This repository contains the files that provide the upload functionality in the IIS Server☆29Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆45Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆80Updated 4 years ago
- ☆17Updated 10 months ago
- Repository to put my notes related to OSCP certification☆19Updated 5 years ago
- ☆30Updated 3 years ago
- ☆24Updated 3 years ago
- ☆133Updated 2 years ago
- ☆29Updated 3 years ago
- ☆44Updated 3 years ago
- ☆13Updated 5 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Updated 2 years ago
- High quality and text versions of cheat sheets from Cyber Detective Twitter☆24Updated last year
- ☆74Updated 3 years ago
- ☆15Updated 3 years ago
- Minimalist notes for CEH-practical Cert.☆33Updated 2 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆22Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆28Updated last year
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- ☆15Updated 3 years ago
- OWASP based Web Application Security Testing Checklist☆72Updated 9 months ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Updated 2 years ago
- ☆19Updated 2 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆21Updated 2 years ago
- ☆30Updated 2 years ago
- ☆15Updated 3 years ago
- ☆39Updated last year