bin3xish477 / cybersecurityLinks
blue team, red team stuff. All things cyber ;)
☆78Updated 6 months ago
Alternatives and similar repositories for cybersecurity
Users that are interested in cybersecurity are comparing it to the libraries listed below
Sorting:
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 5 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- Short checklists for penetration testing methodology☆195Updated 2 years ago
- Is a tool written by using python programming language. Enable a penetration testers to save a time and performing a full Reconnaissance …☆44Updated last year
- ☆45Updated 4 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆145Updated 2 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆84Updated 3 years ago
- MayorSec DNS Enumeration Tool☆89Updated 11 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆98Updated 2 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- Attack Surface Discovery Tool☆110Updated last year
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- OWASP based Web Application Security Testing Checklist☆79Updated last year
- Collaborative pentest tool with highly customizable tools☆75Updated 3 years ago
- Cheat-Sheet of tools for penetration testing☆53Updated 2 years ago
- ☆48Updated 7 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆97Updated 2 years ago
- A WLAN red team framework.☆155Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆54Updated 3 years ago
- Useful Commands, Reverse Shell, Privilege Escalation Methods, Impersonation Attacks, Useful Powershell Commands and more☆120Updated 5 years ago
- ☆29Updated 4 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Updated 6 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆149Updated 4 years ago
- Image Payload Creating/Injecting tools☆13Updated 4 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago