A collection of cheatsheets for various infosec tools and topics.
β813Mar 1, 2021Updated 5 years ago
Alternatives and similar repositories for security-cheatsheets
Users that are interested in security-cheatsheets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π A collection of cheatsheets for various infosec tools and topics.β1,383Mar 18, 2022Updated 4 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.β387Jun 25, 2024Updated last year
- RedSnarf is a pen-testing / red-teaming tool for Windows environmentsβ1,212Sep 14, 2020Updated 5 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.β352Jan 12, 2023Updated 3 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β443Jul 11, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Advanced Web Shellβ580May 1, 2017Updated 8 years ago
- Undetectable Windows Payload Generationβ1,608Nov 8, 2022Updated 3 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.β990Dec 13, 2017Updated 8 years ago
- Specify targets and run sets of tools against themβ387Apr 23, 2019Updated 7 years ago
- a package of Pentest scripts I have made or commonly useβ635Apr 21, 2026Updated last week
- An automated SMB relay exploitation script.β152Oct 11, 2016Updated 9 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the rβ¦β3,276Nov 20, 2025Updated 5 months ago
- PowerShell Runspace Post Exploitation Toolkitβ1,550Aug 2, 2019Updated 6 years ago
- Email recon made fast and easy, with a framework to build onβ955Jan 12, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- π‘ A python program to create a fake AP and sniff data.β1,692Nov 3, 2019Updated 6 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.β5,504Sep 22, 2024Updated last year
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, alβ¦β2,190Dec 11, 2022Updated 3 years ago
- Various Cheat Sheets related to development and securityβ144Jul 16, 2020Updated 5 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repoβ532Nov 4, 2016Updated 9 years ago
- Python and Powershell internal penetration testing frameworkβ720Feb 22, 2016Updated 10 years ago
- A fast and stealthy credential harvesterβ628Jul 11, 2023Updated 2 years ago
- Post Exploitation Collectionβ1,573May 1, 2020Updated 6 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creβ¦β3,860Apr 20, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Analyse SQL injection attempts in web server logsβ82Jan 11, 2017Updated 9 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.β1,999Oct 10, 2018Updated 7 years ago
- Empire is a PowerShell and Python post-exploitation agent.β7,832Jan 19, 2020Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting β¦β90May 8, 2018Updated 7 years ago
- Scripts I use during pentest engagements.β1,026Aug 18, 2020Updated 5 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.β1,045Nov 24, 2019Updated 6 years ago
- A list of published research documentsβ248Jul 10, 2024Updated last year
- Pop shells like a master.β1,486Apr 2, 2019Updated 7 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automaticallyβ496Sep 21, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- HERCULES is a special payload generator that can bypass antivirus softwares.β601Jul 18, 2021Updated 4 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.β348Dec 25, 2016Updated 9 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesecβ454Apr 22, 2016Updated 10 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.β1,322Sep 1, 2021Updated 4 years ago
- Exploitation for XSSβ734Aug 5, 2021Updated 4 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.β1,108Nov 3, 2017Updated 8 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple acβ¦β510Apr 22, 2018Updated 8 years ago