acole76 / pentestmonkey-cheatsheets
modified content from pentestmonkey.net
☆64Updated 4 years ago
Alternatives and similar repositories for pentestmonkey-cheatsheets
Users that are interested in pentestmonkey-cheatsheets are comparing it to the libraries listed below
Sorting:
- ☆36Updated last year
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- Collection of username lists for enumerating kerberos domain users☆91Updated 7 years ago
- Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and h…☆90Updated 3 weeks ago
- Active Directory Wordlists☆94Updated 4 years ago
- ☆48Updated 11 months ago
- Notes compiled for the OSCP exam.☆151Updated 3 years ago
- Aspx reverse shell☆106Updated 5 years ago
- ☆104Updated 5 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆40Updated 4 years ago
- https://alvinsmith.gitbook.io/progressive-oscp/☆40Updated last month
- Web Hacking and Red Teaming MindMap☆72Updated 2 years ago
- A wordlist repository with human-curated and reviewed content.☆105Updated last year
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆96Updated 2 years ago
- SMTP user enumeration via VRFY, EXPN and RCPT with clever timeout, retry and reconnect functionality.☆139Updated 11 months ago
- Describe how to use ffuf different options with examples☆87Updated 2 years ago
- ☆55Updated 6 years ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- All about Active Directory pentesting☆129Updated 4 years ago
- Joomla login bruteforce☆68Updated 9 months ago
- SSTI Payload Generator☆90Updated 2 years ago
- Personal notes used to pass the OSWP exam☆81Updated 2 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 3 years ago
- AD Enum is a pentesting tool that allows to find misconfiguration through the the protocol LDAP and exploit some of those weaknesses with…☆300Updated last year
- Abertay CMP202 Project☆34Updated 4 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated last week
- Active Directory Labs/exams Review☆252Updated 4 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆201Updated 9 months ago
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.☆80Updated this week
- OpenSSH 2.3 < 7.7 - Username Enumeration☆42Updated last year