HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-have resources like Recon-ng-5.x Cheat Sheet, Metasploit Cheat Sheet, Hashcat Cheat Sheet, Nmap Commands Cheat Sheet, Hydra Password Cracking Cheat Sheet, Wireshark Display Filters and much more.
☆80Mar 8, 2024Updated 2 years ago
Alternatives and similar repositories for HaxorHandbook
Users that are interested in HaxorHandbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- An Interface for AI built for cybersecurity professionals☆93Feb 19, 2025Updated last year
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Mar 16, 2023Updated 3 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 3 years ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration…☆162Jan 7, 2025Updated last year
- KaliPAKU is a training tool for penetration testing using Kali Linux. It is designed to help security professionals and engineers improve…☆37Jul 31, 2023Updated 2 years ago
- offensive security scripts and documentation☆30Mar 9, 2026Updated last month
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆49Sep 30, 2024Updated last year
- A simple pentest container equipped with common python pentest tools.☆43Jan 30, 2026Updated 2 months ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆88Apr 4, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Enumeration & fingerprint tool☆24Mar 3, 2024Updated 2 years ago
- Fast Search including Dark Web Search☆130Oct 19, 2022Updated 3 years ago
- Personal blog about cyber security and challenges☆20Mar 25, 2026Updated 3 weeks ago
- Here I am trying to show you some cheat-sheet of nmap. Which may help you on penetration testing and bug hunting.☆20Dec 20, 2021Updated 4 years ago
- 👽 Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.☆32Dec 10, 2023Updated 2 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35Apr 8, 2026Updated last week
- ☆24Feb 7, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Gather information about a Duolingo user☆84Aug 15, 2023Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 3 years ago
- How-to: Pi-Hole + DNSCrypt + Anonymized DNS + Cloudflare DoH Setup on Raspberry Pi 4☆12Apr 1, 2020Updated 6 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- This repository houses diverse files and challenges centered around Just Mobile Security. With practical exercises and resources aimed at…☆13Apr 15, 2024Updated 2 years ago
- Uses python3.10, Debian, python-Nmap, OpenaAI, and flask framework to create a Nmap API that can do scans with a good speed online and is…☆80Jan 22, 2025Updated last year
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 10 months ago
- BugSquasher Bug Bounty Tools List☆21Feb 2, 2023Updated 3 years ago
- Cheat Sheets☆12Feb 25, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A python tool which runs to display random publicly disclosed Hackerone reports when bored. Automatically opens the report in browser.(Ad…☆42Dec 8, 2022Updated 3 years ago
- Free to use editor to create online resume☆18Nov 10, 2023Updated 2 years ago
- Packet sniffer using scapy☆26Mar 21, 2020Updated 6 years ago
- A web interface to control piRa1n☆15May 15, 2021Updated 4 years ago
- This script reads a text file containing domains, fetches the subdomains from crt.sh☆11May 31, 2023Updated 2 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- How to intercept network trafic on Android☆228May 22, 2024Updated last year