PeterSufliarsky / pentesting-cheat-sheetLinks
Useful commands for pentesting Linux and Windows systems
☆14Updated 5 years ago
Alternatives and similar repositories for pentesting-cheat-sheet
Users that are interested in pentesting-cheat-sheet are comparing it to the libraries listed below
Sorting:
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 5 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- ☆32Updated 4 years ago
- Web application pentesting recon☆23Updated 5 years ago
- Information-Gathering Shell Script☆30Updated 5 years ago
- ☆19Updated 4 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Updated 9 months ago
- Notes from OSCP, CTF, security adventures, etc...☆62Updated last year
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Updated 6 years ago
- Journey to Try Harder !!!☆32Updated 6 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- King of Bug Bounty Tips Simple Tool☆13Updated 4 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 5 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- ☆52Updated 8 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20Updated 5 years ago
- Security test tool for Blind XSS☆26Updated 5 years ago
- Unique wordlist generator of unique wordlists.☆42Updated 2 years ago
- Penetration Testing Checklist☆37Updated 5 years ago
- ☆38Updated 4 years ago
- Simple shell script for automated domain recognition with some tools☆20Updated 6 years ago
- ☆20Updated 4 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Updated 6 years ago
- XSS scanning with Dalfox on Github-action☆26Updated last year
- Command Execution exploiter with an auto connection handling☆32Updated 3 years ago
- Create visualization from Shodan query☆76Updated 4 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- ☆19Updated 4 years ago
- ☆24Updated 6 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Updated 7 years ago