d1eanotherday / Hacking-CheatsheetLinks
In this repo I collect all commands, links, techniques and tricks i found during my work as pentester, hacker, OSCP student and hack the box fan.
☆63Updated 4 years ago
Alternatives and similar repositories for Hacking-Cheatsheet
Users that are interested in Hacking-Cheatsheet are comparing it to the libraries listed below
Sorting:
- Notes from OSCP, CTF, security adventures, etc...☆61Updated last year
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆105Updated 2 years ago
- Pentest stuff☆49Updated last year
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Updated 4 years ago
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆20Updated 5 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆33Updated 3 years ago
- A simple reconnaissance framework for bug bounty hunting☆36Updated 4 years ago
- Hello my friends, it is my repo about sql injections. Call me in Telegram: @anakein☆44Updated 4 years ago
- Host Header Injection Scanner☆47Updated 4 years ago
- just a little treasure chest of stuff I need to watch / read later☆32Updated 4 years ago
- Passive subdomain enumeration tool with http-probe.☆33Updated 4 years ago
- 0x0p1n3r is set of combination of other tools and one line scripts to find subdomains easily and to check subdomain takeover☆57Updated 4 years ago
- Dorks for Google, Shodan and BinaryEdge☆144Updated 5 years ago
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆80Updated 4 years ago
- Auto deployment of my VPS☆101Updated 3 years ago
- Journey to Try Harder !!!☆32Updated 5 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆41Updated 2 years ago
- Penetration Test Methodology☆18Updated this week
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆23Updated last year
- A Python based scanner to find potential SSRF parameters in a web application.☆72Updated 4 years ago
- Some Templates for Bash Scripting☆16Updated 2 years ago
- A docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.☆72Updated 11 months ago
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆27Updated 3 years ago
- Web Application recon automation☆125Updated 4 years ago
- ☆48Updated 4 years ago
- Handy bash and python scripts for bug bounty hunting!☆47Updated 4 years ago
- Pipe different tools with google dork Scanner☆56Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago