Jakson2030 / kali-linux-cheatsheetLinks
Kali Linux Cheat Sheet for Penetration Testers
☆14Updated 8 years ago
Alternatives and similar repositories for kali-linux-cheatsheet
Users that are interested in kali-linux-cheatsheet are comparing it to the libraries listed below
Sorting:
- Cheat-Sheet of tools for penetration testing☆54Updated 2 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Updated 6 years ago
- ☆25Updated 5 years ago
- Journey to Try Harder !!!☆31Updated 6 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- ☆17Updated 4 years ago
- ☆27Updated last year
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆19Updated 5 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆44Updated 6 years ago
- These are my notes for OSCP preparation. Hope you'll find them useful.☆14Updated 6 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆57Updated 8 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 8 years ago
- Pentest stuff☆49Updated 2 years ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago
- OSWE Preparation☆38Updated 6 years ago
- ☆72Updated 5 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Updated 6 years ago
- ☆14Updated 5 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 5 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 6 years ago
- ☆51Updated 8 years ago
- ☆19Updated 6 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- OSCP guide and Red Team assessment Guide☆36Updated 5 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆20Updated 3 weeks ago
- A simple Cherry Tree template that can be used to organize bug bounties☆39Updated 6 years ago
- Pipe different tools with google dork Scanner☆56Updated 5 years ago
- Another Subdomain ENumeration Tool☆13Updated 3 years ago