Kr0wZ / pentest-cheatsheetLinks
My tips (for myself) when doing pentest, box and challenges
☆14Updated 4 years ago
Alternatives and similar repositories for pentest-cheatsheet
Users that are interested in pentest-cheatsheet are comparing it to the libraries listed below
Sorting:
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated last year
- Generate common Reverse Shells for Pentesting☆43Updated 4 years ago
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆124Updated 3 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- This is a simple Cheat Sheet which can be helpful while pentesting☆50Updated 2 years ago
- Automated rogue access point setup tool.☆200Updated 4 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆118Updated 2 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Updated 4 months ago
- A Powerfull BUG HUNTING TOOL. Supports SQL, XSS, PHP code execution, SSRF,.... I had Appended My Own Payloads which I had founded during …☆56Updated 4 years ago
- CTF writeups - Tryhackme, HackTheBox, Vulnhub☆41Updated 4 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- ☆141Updated 3 years ago
- OSCP Notes written from PWK Course☆52Updated 4 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆107Updated 2 years ago
- Automatic & lightning fast wordpress vulnerability scanner☆45Updated 4 years ago
- Helping you delete your old accounts☆85Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆86Updated 4 years ago
- A Zphisher GUI Back-Office Plugin☆234Updated 2 years ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆23Updated 3 years ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆114Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Bash script for CTF automating basic enumeration☆42Updated 3 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 4 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆243Updated last year
- Magicleaks it's a python script that checks if an email or a list of email accounts was compromised☆71Updated 4 years ago
- Short checklists for penetration testing methodology☆198Updated 2 years ago
- My documentation and tools for learn ethical hacking.☆144Updated 2 months ago