Snifer / security-cheatsheets
A collection of cheatsheets for various infosec tools and topics.
☆805Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for security-cheatsheets
- Post Exploitation Collection☆1,554Updated 4 years ago
- Personal Collection of Operating Systems Scripts☆555Updated 6 months ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆520Updated 7 years ago
- Command line utility for searching and downloading exploits☆1,726Updated 5 months ago
- SimplE RePort wrIting and COllaboration tool☆1,093Updated 4 years ago
- 🔒 A collection of cheatsheets for various infosec tools and topics.☆1,271Updated 2 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆379Updated 7 years ago
- Scripts I use during pentest engagements.☆997Updated 4 years ago
- WebApp Information Gatherer☆539Updated 6 years ago
- Python and Powershell internal penetration testing framework☆719Updated 8 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,203Updated 4 years ago
- Penetration Testing tools - one repo to clone them all... containing latest pen testing tools☆522Updated 4 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,284Updated 3 years ago
- a package of Pentest scripts I have made or commonly use☆609Updated last month
- Repository for the Smartphone Pentest Framework (SPF)☆452Updated 7 years ago
- wide range mass audit toolkit☆986Updated 6 years ago
- PwnWiki - The notes section of the pentesters mind.☆554Updated 6 years ago
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆316Updated 5 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo☆465Updated 8 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,005Updated 5 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆760Updated 4 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆820Updated 7 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆629Updated 6 years ago
- ☆423Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆486Updated 3 years ago