bin3xish477 / cybersecurity
blue team, red team stuff. All things cyber ;)
☆75Updated 4 months ago
Alternatives and similar repositories for cybersecurity:
Users that are interested in cybersecurity are comparing it to the libraries listed below
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆80Updated 4 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- list of useful commands, shells and notes related to OSCP☆77Updated 7 years ago
- This is a cyber security operations compilation of tools and techniques compiled by Chris Davis. Gerald Auger did not create or add to th…☆25Updated 4 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 5 years ago
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- List of red team resources☆91Updated 7 years ago
- This software is for study to Computer Hacker Forensic Investigator certification☆25Updated 5 years ago
- ☆131Updated 2 years ago
- ☆73Updated 3 years ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆64Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆43Updated 3 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆95Updated 2 months ago
- This repository contains the files that provide the upload functionality in the IIS Server☆29Updated 3 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆50Updated 4 years ago
- ☆65Updated 3 years ago
- Slides for my conference talks☆43Updated last year
- ☆37Updated last year
- list of useful commands, shells and notes related to OSCP☆24Updated 7 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆61Updated last month
- OWASP based Web Application Security Testing Checklist☆71Updated 8 months ago
- ☆43Updated 8 years ago
- Mind Maps for penetration testing☆19Updated 4 years ago
- ☆98Updated 3 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆96Updated last year
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Updated 4 years ago
- MayorSec DNS Enumeration Tool☆85Updated 3 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆90Updated 2 years ago