Web Hacking and Red Teaming MindMap
☆78Dec 24, 2025Updated 2 months ago
Alternatives and similar repositories for Pentesting-Mind-Map
Users that are interested in Pentesting-Mind-Map are comparing it to the libraries listed below
Sorting:
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- ☆25Jan 11, 2023Updated 3 years ago
- Red Team Stuffs☆19Jul 7, 2022Updated 3 years ago
- Red Team scripts written in python☆17Jul 24, 2022Updated 3 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- All credits to Matt Walker (Author of "CEH Certified Ethical Hacker All-in-One Exam Guide" ISBN 1264269943)☆11Feb 5, 2022Updated 4 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆48Apr 4, 2019Updated 6 years ago
- Mind Maps for penetration testing☆21Feb 4, 2021Updated 5 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆52Jun 27, 2024Updated last year
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 2 months ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- ☆52Oct 10, 2025Updated 5 months ago
- Collected resources for OSWA preparation.☆26Jan 25, 2023Updated 3 years ago
- Common Bugs from low to critical Level☆16May 9, 2021Updated 4 years ago
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 3 years ago
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35Mar 3, 2026Updated 2 weeks ago
- A compilation of important commands, files, and tools used in Pentesting☆54Jan 17, 2023Updated 3 years ago
- ☆53Apr 19, 2023Updated 2 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 3 years ago
- This repo is all about Blue teamming and CyberDefenders Write-up for their DFIR challenges☆18Nov 5, 2023Updated 2 years ago
- blog☆24Mar 9, 2026Updated last week
- Automated Subdomain Enumeration and Scanning Tool☆116Oct 5, 2023Updated 2 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- ☆31Mar 21, 2023Updated 3 years ago
- 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE☆14Jun 19, 2022Updated 3 years ago
- Script for automating Linux memory capture and analysis☆13May 6, 2020Updated 5 years ago
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- 「💉」XSS Payload List☆45Feb 26, 2023Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- Attack Surface Discovery Tool☆110Sep 17, 2024Updated last year
- ☆24Feb 7, 2025Updated last year
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆21May 20, 2024Updated last year
- Collection of useful command line commands☆14Dec 10, 2021Updated 4 years ago