Pentesting Cheatsheets and Guides
☆125Jul 20, 2017Updated 8 years ago
Alternatives and similar repositories for Pentesting
Users that are interested in Pentesting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Powershell Privilege Escalation Enumeration Script.☆315Mar 14, 2018Updated 8 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- Terribad PrivEsc enumeration script for Windows systems☆15Oct 23, 2020Updated 5 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆12Aug 7, 2016Updated 9 years ago
- A ton of helpful tools☆345Oct 8, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆12Oct 16, 2017Updated 8 years ago
- Offensive Security / Pentesting Cheat Sheets☆104Jul 14, 2018Updated 7 years ago
- ☆510May 27, 2018Updated 7 years ago
- Repository for all cbapi example scripts☆16Sep 18, 2018Updated 7 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Jun 2, 2016Updated 9 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆18Jul 8, 2019Updated 6 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Jul 18, 2018Updated 7 years ago
- Effectively search the Exploit-DB☆15Apr 16, 2020Updated 5 years ago
- offsec batteries included☆1,606Mar 11, 2024Updated 2 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing☆19Feb 4, 2022Updated 4 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Jul 9, 2020Updated 5 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Mar 2, 2022Updated 4 years ago
- Linux pentest tools☆89Nov 4, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,188Dec 11, 2022Updated 3 years ago
- Fuzzbunch deployment for Debian - Intructions: Readme.md☆143Oct 16, 2025Updated 5 months ago
- This reconissance tool is specific written for OSCP engagements.☆55May 22, 2023Updated 2 years ago
- Basics of Windows privilege escalation☆134Sep 30, 2017Updated 8 years ago
- 🎖 A complete write-up of the Avast challenge given at Hack Cambridge 2018☆19Jun 16, 2019Updated 6 years ago
- Reconnaissance scripts for penetration testing☆59Jul 7, 2015Updated 10 years ago
- scripts for pentesting☆88Oct 5, 2018Updated 7 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆51Dec 8, 2022Updated 3 years ago
- ☆122Mar 27, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Splunk TA for alert action to TheHive-project☆11May 13, 2020Updated 5 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago
- PowerShell implementations of path-finding algorithms using graph theory☆79Feb 17, 2016Updated 10 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Jan 25, 2024Updated 2 years ago
- Created on 10th August 2017. Purpose of this Project is to note down every useful object I gained during the time I spent working on OSCP…☆19Feb 26, 2018Updated 8 years ago