A collection of cheatsheets for various infosec tools and topics.
β812Mar 1, 2021Updated 5 years ago
Alternatives and similar repositories for security-cheatsheets
Users that are interested in security-cheatsheets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π A collection of cheatsheets for various infosec tools and topics.β1,380Mar 18, 2022Updated 4 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.β388Jun 25, 2024Updated last year
- RedSnarf is a pen-testing / red-teaming tool for Windows environmentsβ1,213Sep 14, 2020Updated 5 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.β352Jan 12, 2023Updated 3 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β443Jul 11, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Advanced Web Shellβ580May 1, 2017Updated 8 years ago
- Undetectable Windows Payload Generationβ1,610Nov 8, 2022Updated 3 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.β987Dec 13, 2017Updated 8 years ago
- Specify targets and run sets of tools against themβ387Apr 23, 2019Updated 6 years ago
- a package of Pentest scripts I have made or commonly useβ632Nov 21, 2025Updated 4 months ago
- An automated SMB relay exploitation script.β152Oct 11, 2016Updated 9 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the rβ¦β3,268Nov 20, 2025Updated 4 months ago
- PowerShell Runspace Post Exploitation Toolkitβ1,549Aug 2, 2019Updated 6 years ago
- Email recon made fast and easy, with a framework to build onβ958Jan 12, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI β’ AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- π‘ A python program to create a fake AP and sniff data.β1,689Nov 3, 2019Updated 6 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.β5,499Sep 22, 2024Updated last year
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, alβ¦β2,189Dec 11, 2022Updated 3 years ago
- Various Cheat Sheets related to development and securityβ144Jul 16, 2020Updated 5 years ago
- PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repoβ532Nov 4, 2016Updated 9 years ago
- Python and Powershell internal penetration testing frameworkβ720Feb 22, 2016Updated 10 years ago
- A fast and stealthy credential harvesterβ628Jul 11, 2023Updated 2 years ago
- Post Exploitation Collectionβ1,573May 1, 2020Updated 5 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creβ¦β3,835Apr 2, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Analyse SQL injection attempts in web server logsβ82Jan 11, 2017Updated 9 years ago
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.β2,001Oct 10, 2018Updated 7 years ago
- Empire is a PowerShell and Python post-exploitation agent.β7,834Jan 19, 2020Updated 6 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting β¦β88May 8, 2018Updated 7 years ago
- Scripts I use during pentest engagements.β1,026Aug 18, 2020Updated 5 years ago
- A list of published research documentsβ248Jul 10, 2024Updated last year
- A Ruby framework designed to aid in the penetration testing of WordPress systems.β1,044Nov 24, 2019Updated 6 years ago
- Pop shells like a master.β1,489Apr 2, 2019Updated 7 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.β601Jul 18, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automaticallyβ497Sep 21, 2021Updated 4 years ago
- β21Jul 15, 2016Updated 9 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.β347Dec 25, 2016Updated 9 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesecβ453Apr 22, 2016Updated 9 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.β1,322Sep 1, 2021Updated 4 years ago
- Exploitation for XSSβ730Aug 5, 2021Updated 4 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.β1,110Nov 3, 2017Updated 8 years ago