Just a part of my private notes
☆97Oct 23, 2023Updated 2 years ago
Alternatives and similar repositories for CheatSheet
Users that are interested in CheatSheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of PDF/books about the modern web application security and bug bounty.☆1,796Dec 14, 2023Updated 2 years ago
- automate wifi hacking with wicker☆66Jun 27, 2024Updated last year
- A set of tools, procedures, and playbooks for performing bug bounties☆17Dec 2, 2018Updated 7 years ago
- ☆55Aug 22, 2017Updated 8 years ago
- ☆47Jan 14, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Tips For Bug Bounty Hunters☆86Jul 16, 2022Updated 3 years ago
- ☆12Feb 20, 2025Updated last year
- Cool resources and content for bug bounty hunting.☆19Oct 1, 2021Updated 4 years ago
- A list of Awesome Bughunting oneliners , collected from the various sources☆69Aug 14, 2023Updated 2 years ago
- a collection of pdfs i like to read☆26May 25, 2023Updated 2 years ago
- sshchecker is a fast dedicated ssh brute-forcing tool to check ssh login on the giving IP list.☆23Feb 8, 2026Updated last month
- port+dir+param bruteforcing at the same time using ffuf☆17Jul 27, 2024Updated last year
- Some Tutorials and Things to Help Bug Hunter☆31Mar 17, 2021Updated 5 years ago
- My Private Bug Hunting Methodology☆316Nov 27, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A collection oneliner scripts for bug bounty☆186Mar 21, 2024Updated 2 years ago
- A simple reconnaissance framework for bug bounty hunting☆37Oct 16, 2020Updated 5 years ago
- Bug Bounty Web and API Payloads☆39Feb 5, 2026Updated last month
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- Top disclosed reports from HackerOne☆10Apr 15, 2021Updated 4 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- ☆41Mar 29, 2025Updated 11 months ago
- Process URLs and remove duplicate query parameters.☆27Mar 19, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- quick and dirty proof-of-concept to hide shells in images☆52Jun 27, 2024Updated last year
- Ressources for bug bounty hunting☆1,910Dec 1, 2022Updated 3 years ago
- Basic Bash Script to scrape all subdomains from crtsh in a single run☆19May 23, 2022Updated 3 years ago
- Collection of red team scripts, resources & configs.☆15Feb 14, 2026Updated last month
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- The EMV QR Code Decoder Library is a Kotlin-based utility that decodes EMV QR codes into structured data. It provides classes and enums t…☆12Apr 13, 2024Updated last year
- Bug Bounty ~ Awesomes | Books | Cheatsheets | Checklists | Tools | Wordlists | More☆523Oct 27, 2025Updated 5 months ago
- Bug Hunting Handbook☆11Aug 11, 2022Updated 3 years ago
- TikTok Phishing Attack Simulation Tool designed for ethical hacking, security awareness, and educational purposes.☆26Aug 2, 2025Updated 7 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- OSCP☆37Nov 24, 2021Updated 4 years ago
- ☆10Jul 28, 2021Updated 4 years ago
- Hacking with the power of checklists.☆39Dec 18, 2018Updated 7 years ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 7 months ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Jun 14, 2023Updated 2 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- This Repo Contain Summary of The eLearnSecurity Web Application Penetration Tester certification Content☆20Apr 9, 2022Updated 3 years ago