Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient commands for your pentesting / red-teaming engagements, OSCP and CTFs.
☆94Oct 13, 2025Updated 4 months ago
Alternatives and similar repositories for Offensive-Enumeration
Users that are interested in Offensive-Enumeration are comparing it to the libraries listed below
Sorting:
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆101Feb 12, 2025Updated last year
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆98Sep 27, 2025Updated 5 months ago
- Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers every…☆36Jan 6, 2025Updated last year
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆427Sep 20, 2024Updated last year
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆20Aug 19, 2025Updated 6 months ago
- ☆11Dec 17, 2023Updated 2 years ago
- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Secur…☆61Aug 19, 2025Updated 6 months ago
- Ant is a post-exploitation tool designed to automate the deployment of tunnels and port forwarding based on a predefined topology configu…☆17Jan 31, 2024Updated 2 years ago
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 2 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- Reconnaisance Tool☆12Jun 4, 2020Updated 5 years ago
- This repository is about Learn | Hack | Share | Repeat.☆11Dec 26, 2022Updated 3 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Jul 7, 2021Updated 4 years ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- All the information provided on this site is for educational purposes only.☆18Feb 27, 2024Updated 2 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆40Dec 29, 2020Updated 5 years ago
- A simple bug bounty utility tool to remove uninteresting entries from a list of URLs.☆14Jul 22, 2024Updated last year
- Reporting template for OSCP, VHL and more.☆17Oct 30, 2021Updated 4 years ago
- Store my 'Useful Commands' for HTB/OSCP and additional notes from my Obisidan. Merge into Obsidian for direct formatting. Also check out …☆16Aug 16, 2023Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Aug 8, 2020Updated 5 years ago
- HackTricks Automatic Commands (HAC) is an enumeration platform powered by book.HackTricks.xyz☆22Oct 25, 2021Updated 4 years ago
- ☆42Jul 14, 2021Updated 4 years ago
- Get GTFOBins info about a given exploit from the command line☆39Aug 4, 2024Updated last year
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆44Aug 1, 2021Updated 4 years ago
- Scripts usados en mi formación de Offensive Security por medio de la suscripción Learn Unlimited☆16Apr 23, 2022Updated 3 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Commands, snippets, exploits, tools, lists, collections and techniques I used on my journey to becoming an OSCP.☆306Mar 10, 2021Updated 4 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Apr 8, 2022Updated 3 years ago
- You can gather useful information accounts by username across all types networks ( which also include social media)☆27Oct 19, 2023Updated 2 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- ☆21Aug 28, 2022Updated 3 years ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆55Jan 25, 2022Updated 4 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Jan 2, 2021Updated 5 years ago
- Windows shellcode encoding and encrypting tool☆20May 4, 2022Updated 3 years ago
- Parent Process ID Spoofing, coded in CGo.☆24Apr 21, 2025Updated 10 months ago