akenofu / HackAllTheThingsLinks
Meticulously curated security notes with Emphasis on Application Security, DevSecOps, Cloud Computing, and Penetration Testing.
☆137Updated last year
Alternatives and similar repositories for HackAllTheThings
Users that are interested in HackAllTheThings are comparing it to the libraries listed below
Sorting:
- Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and h…☆91Updated last month
- Sample Obsidian's vault for web pentesting☆97Updated 9 months ago
- Bringing infosec community, group and leaders together that solve community challenges, problems, create cultural and provide value to In…☆189Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated this week
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.☆81Updated last week
- List of red team resources☆95Updated 7 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Write-Ups for HackTheBox☆105Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- ☆226Updated 2 years ago
- OSCP preparation tools, scripts and cheatsheets☆57Updated 2 years ago
- ☆76Updated 4 years ago
- Notes from OSCP, CTF, security adventures, etc...☆60Updated last year
- ☆47Updated 7 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 3 years ago
- Attack Surface Discovery Tool☆108Updated 8 months ago
- eLearnSecurity Certified Exploit Development☆104Updated 3 years ago
- Opening the door, one reverse shell at a time☆184Updated 4 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- OSCP Privilege Escalation MindMap/Guide☆195Updated 3 years ago
- A wordlist repository with human-curated and reviewed content.☆108Updated last year
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆167Updated last year
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆92Updated last year
- ☆74Updated 3 years ago
- ☆133Updated 2 years ago
- My Password Cracking Methodology☆82Updated 2 years ago
- You don't need wires to be connected☆40Updated 5 years ago
- ☆18Updated 2 years ago
- Active Directory Wordlists☆94Updated 5 years ago
- ☆208Updated 3 years ago