PeterSufliarsky / pentesting-cheat-sheet
Useful commands for pentesting Linux and Windows systems
☆13Updated 4 years ago
Alternatives and similar repositories for pentesting-cheat-sheet:
Users that are interested in pentesting-cheat-sheet are comparing it to the libraries listed below
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆18Updated 4 years ago
- ☆19Updated 3 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Security test tool for Blind XSS☆26Updated 5 years ago
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆13Updated 5 years ago
- Tool to find stored robots.txt files from the past☆17Updated last year
- Automate bug bounty recon using bash alias☆14Updated 7 months ago
- All The Notes And Tips I FOund In Github And Twitter I Put Them Here☆34Updated 4 years ago
- Autorev.sh generates reverse shell codes for reverse shell . Supports linux and windows☆16Updated 2 years ago
- Offensive Security Wireless Professional☆17Updated 5 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- ☆24Updated 5 years ago
- Script Recon Bug Bounty☆10Updated 3 years ago
- Principles and commands for penetration testing and OSCP☆9Updated 5 years ago
- Wordlist generator☆15Updated 4 years ago
- Reconnaisance Tool☆11Updated 4 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆27Updated 3 years ago
- ☆24Updated 5 years ago
- King of Bug Bounty Tips Simple Tool☆12Updated 3 years ago
- Noob Penetration tester☆11Updated 10 months ago
- Web application pentesting recon☆23Updated 4 years ago
- ☆14Updated 4 years ago
- ☆13Updated 3 years ago
- Notes on Active Directory analysis and exploitation☆11Updated 6 years ago
- Open Redirect Vulnerability Payload List☆12Updated 4 years ago
- Find endpoints in archived versions of robots.txt☆14Updated 5 years ago
- ☆20Updated 3 years ago