Kr0wZ / pentest-cheatsheetLinks
My tips (for myself) when doing pentest, box and challenges
☆14Updated 3 years ago
Alternatives and similar repositories for pentest-cheatsheet
Users that are interested in pentest-cheatsheet are comparing it to the libraries listed below
Sorting:
- Automatic & lightning fast wordpress vulnerability scanner☆46Updated 3 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated 7 months ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆159Updated last week
- Generate common Reverse Shells for Pentesting☆42Updated 4 years ago
- A Powerfull BUG HUNTING TOOL. Supports SQL, XSS, PHP code execution, SSRF,.... I had Appended My Own Payloads which I had founded during …☆53Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 5 years ago
- A Linux Packet Sniffing Suite for Automated MiTM Attacks☆239Updated 11 months ago
- A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆44Updated 3 years ago
- Ethical Hacking Toolkit is a collection of tools, cheat sheets, and resources for Ethical hackers, Penetration Tester, and Security Resea…☆121Updated 3 years ago
- Python Gmail User Enumeration Tool☆3Updated 3 weeks ago
- Tryhackme rooms & tools☆64Updated 5 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆83Updated 4 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆24Updated 4 years ago
- Magicleaks it's a python script that checks if an email or a list of email accounts was compromised☆69Updated 3 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆113Updated 2 years ago
- My documentation and tools for learn ethical hacking.☆142Updated 4 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆104Updated last year
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- ☆48Updated 7 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆62Updated 4 years ago
- OSCP Notes written from PWK Course☆50Updated 4 years ago
- ☆70Updated 2 years ago
- [EN] BETA: Layla - recon tool for bug bounty☆76Updated 3 years ago
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Updated 5 years ago
- CTF writeups - Tryhackme, HackTheBox, Vulnhub☆39Updated 4 years ago
- Short checklists for penetration testing methodology☆191Updated last year
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆26Updated 3 years ago
- A WLAN red team framework.☆157Updated 10 months ago