An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration testing process. This guide will focus on both the penetration testing and red team process and contain detailed information.
☆162Jan 7, 2025Updated last year
Alternatives and similar repositories for Penetration-Testing-Cheat-Sheet
Users that are interested in Penetration-Testing-Cheat-Sheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 3 years ago
- quick and dirty proof-of-concept to hide shells in images☆52Jun 27, 2024Updated last year
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 3 months ago
- ☆31Mar 21, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 3 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Jan 2, 2025Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆80Mar 8, 2024Updated 2 years ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆101Aug 14, 2025Updated 8 months ago
- backdoor exploit for vsftpd 2.3.4 on python☆16Oct 14, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- A RedTeam Toolkit☆409Aug 14, 2025Updated 8 months ago
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 11 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Aug 11, 2024Updated last year
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- Work in progress...☆474Feb 24, 2026Updated last month
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆49Sep 30, 2024Updated last year
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆140Mar 24, 2026Updated 3 weeks ago
- Command & Control-Framework created for collaboration in python3☆324Aug 7, 2023Updated 2 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,275Apr 12, 2024Updated 2 years ago
- Fast Search including Dark Web Search☆130Oct 19, 2022Updated 3 years ago
- Remote persistent 🔑Logger for Windows and Linux☆294Apr 21, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆20Jul 7, 2024Updated last year
- ☆91Aug 5, 2023Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Nov 17, 2022Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆79Dec 24, 2025Updated 3 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆91Jul 26, 2024Updated last year
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆34Feb 2, 2026Updated 2 months ago
- A compilation of important commands, files, and tools used in Pentesting☆55Jan 17, 2023Updated 3 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Apr 6, 2025Updated last year
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- How to intercept network trafic on Android☆228May 22, 2024Updated last year
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆114Feb 3, 2026Updated 2 months ago
- ☆27Apr 24, 2025Updated 11 months ago
- Cheat-Sheet of tools for penetration testing☆53May 23, 2023Updated 2 years ago
- Recursos y materiales vistos, usados, en el taller de Introducción al Hacking Ético, que ha sido impartido por Jesús Eduardo Lugo Vela y …☆14Mar 14, 2024Updated 2 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.☆82Sep 13, 2024Updated last year