curtishoughton / Penetration-Testing-Cheat-SheetView external linksLinks
An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration testing process. This guide will focus on both the penetration testing and red team process and contain detailed information.
☆156Jan 7, 2025Updated last year
Alternatives and similar repositories for Penetration-Testing-Cheat-Sheet
Users that are interested in Penetration-Testing-Cheat-Sheet are comparing it to the libraries listed below
Sorting:
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Jan 2, 2025Updated last year
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated last month
- ☆31Mar 21, 2023Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 2 years ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Jul 21, 2023Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Jun 27, 2024Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆79Mar 8, 2024Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Aug 11, 2024Updated last year
- A RedTeam Toolkit☆409Aug 14, 2025Updated 6 months ago
- Maltego Transforms for generating screenshots from Websites and URLs☆17Apr 24, 2023Updated 2 years ago
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆48Sep 30, 2024Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆102Aug 14, 2025Updated 6 months ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆138Oct 14, 2025Updated 4 months ago
- Fast Search including Dark Web Search☆131Oct 19, 2022Updated 3 years ago
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- backdoor exploit for vsftpd 2.3.4 on python☆16Oct 14, 2023Updated 2 years ago
- Remote persistent 🔑Logger for Windows and Linux☆294Apr 21, 2023Updated 2 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Feb 2, 2026Updated 2 weeks ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Nov 17, 2022Updated 3 years ago
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆21May 13, 2025Updated 9 months ago
- Automate Scoping, OSINT and Recon assessments.☆111Feb 3, 2026Updated last week
- Web Hacking and Red Teaming MindMap☆78Dec 24, 2025Updated last month
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆91Jul 26, 2024Updated last year
- A compilation of important commands, files, and tools used in Pentesting☆53Jan 17, 2023Updated 3 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,248Apr 12, 2024Updated last year
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- Work in progress...☆468Updated this week
- ☆25Jan 19, 2026Updated 3 weeks ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 2 years ago
- Just some random Red Team Scripts that can be useful☆154Jun 28, 2024Updated last year
- Command & Control-Framework created for collaboration in python3☆322Aug 7, 2023Updated 2 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Jul 7, 2023Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Dec 26, 2023Updated 2 years ago
- ☆18Apr 3, 2023Updated 2 years ago
- ☆20Jul 7, 2024Updated last year