HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-have resources like Recon-ng-5.x Cheat Sheet, Metasploit Cheat Sheet, Hashcat Cheat Sheet, Nmap Commands Cheat Sheet, Hydra Password Cracking Cheat Sheet, Wireshark Display Filters and much more.
☆81Mar 8, 2024Updated 2 years ago
Alternatives and similar repositories for HaxorHandbook
Users that are interested in HaxorHandbook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- An Interface for AI built for cybersecurity professionals☆94Feb 19, 2025Updated last year
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆21Mar 16, 2023Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 3 years ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 3 years ago
- KaliPAKU is a training tool for penetration testing using Kali Linux. It is designed to help security professionals and engineers improve…☆37Jul 31, 2023Updated 2 years ago
- offensive security scripts and documentation☆30Mar 9, 2026Updated 2 months ago
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆49Sep 30, 2024Updated last year
- A simple pentest container equipped with common python pentest tools.☆43Jan 30, 2026Updated 3 months ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆88Apr 4, 2024Updated 2 years ago
- Enumeration & fingerprint tool☆24Mar 3, 2024Updated 2 years ago
- Fast Search including Dark Web Search☆131Oct 19, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Personal blog about cyber security and challenges☆20Mar 25, 2026Updated last month
- 👽 Metasploit is the most widely used open-source exploitation framework. Learn how to use it and unlock its full potential.☆32Dec 10, 2023Updated 2 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- Security Work and Manual Reviews facilitated by Open Source Technology Improvement Fund, aka OSTIF☆35Updated this week
- ☆24Feb 7, 2025Updated last year
- Gather information about a Duolingo user☆85Aug 15, 2023Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆37Mar 13, 2023Updated 3 years ago
- BugSquasher Bug Bounty Tools List☆21Feb 2, 2023Updated 3 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Cheat Sheets☆12Feb 25, 2019Updated 7 years ago
- Packet sniffer using scapy☆26Mar 21, 2020Updated 6 years ago
- This script reads a text file containing domains, fetches the subdomains from crt.sh☆11May 31, 2023Updated 2 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- EF/CF - Extremely Fast smart Contract Fuzzing☆70Jul 11, 2023Updated 2 years ago
- How to intercept network trafic on Android☆228May 22, 2024Updated last year
- ☆16Apr 21, 2023Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆79Dec 24, 2025Updated 4 months ago
- A compilation of important commands, files, and tools used in Pentesting☆56Jan 17, 2023Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36May 27, 2023Updated 2 years ago
- Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader☆20Aug 4, 2019Updated 6 years ago
- Install popular tools used while pentesting & playing labs☆14Oct 8, 2021Updated 4 years ago
- FortiOS 管理界面中的堆内存下溢导致远程代码执行☆23Jun 21, 2023Updated 2 years ago
- A python network scanner using scapy☆25Mar 21, 2020Updated 6 years ago
- Protect your personal information from hackers and cyber criminals with HackAlert. Our product scans the internet for your online persona…☆18Oct 16, 2024Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year