Nmap cheatsheet for penetration testing
☆59Jul 17, 2019Updated 6 years ago
Alternatives and similar repositories for nmap-cheatsheet
Users that are interested in nmap-cheatsheet are comparing it to the libraries listed below
Sorting:
- How to do recon on a web-application properly☆15Jul 12, 2022Updated 3 years ago
- Backup easily your system with Bitwarden, BorgBase and Docker☆20Mar 2, 2026Updated last week
- List of groups that are carrying out cyber actions in the conflict between Israel and Iran.☆31Feb 12, 2026Updated 3 weeks ago
- Reference guide for scanning networks with Nmap.☆693Nov 5, 2019Updated 6 years ago
- Script to audit / deploy LAPS☆25Feb 25, 2025Updated last year
- Visa cvv tool for obtaining promotional visas and running the performance and will give you 20 with all its information.☆10Jun 25, 2021Updated 4 years ago
- Fake mail generator for the termux,kali,windows☆29Jan 13, 2025Updated last year
- Learn Microsoft Office 2019, published by Packt☆12Jan 18, 2023Updated 3 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- This project involves creating a basic URL shortener using Go and Redis. The purpose is to convert lengthy URLs into shorter links, expl…☆11Oct 9, 2023Updated 2 years ago
- ⭐A ready to use Android app template.Navigation Drawer with fragments and Swipeable tabs. The most used layout for organized and minimal …☆11Aug 9, 2020Updated 5 years ago
- ☆13Apr 2, 2023Updated 2 years ago
- In accordance with survey reports, the growth of online business worldwide is significantly faster and higher in comparison with traditio…☆13Jul 30, 2023Updated 2 years ago
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and …☆40Nov 12, 2023Updated 2 years ago
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated 2 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 3 weeks ago
- ☆10Mar 24, 2021Updated 4 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- Airline Reservation System” main aim is to provide the online ticket & seat reservation of National and International Flights and also gi…☆11Jan 4, 2018Updated 8 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- 一些平时自己整理的fuzz字典和爆破字典☆15Mar 24, 2020Updated 5 years ago
- Post-quantum Wireguard (Theory)☆12Sep 9, 2020Updated 5 years ago
- 红队/渗透测试的工具和技术集,项目/A-poc/RedTeam-Tools 中文译版☆12Jan 3, 2023Updated 3 years ago
- ☆10Jun 29, 2024Updated last year
- ☆13Apr 16, 2024Updated last year
- Opinionated set of tools created by Apptension☆10May 30, 2017Updated 8 years ago
- ☆11Apr 10, 2025Updated 11 months ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Qubes OS + Borg + Rsync.net backup strategy scripts☆16Aug 3, 2017Updated 8 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- DDos attack☆10Feb 13, 2023Updated 3 years ago
- ☆29Oct 25, 2025Updated 4 months ago
- Swipe your widgets to add functionalities in each dismissed direction.☆12Nov 24, 2020Updated 5 years ago
- Simple, reliable, persistent, undetectable Android reverse shell payload, compatible with Android 8, 9, 10, 11, 12 and 13☆12Dec 30, 2023Updated 2 years ago
- A web interface for exploring MetaMask state logs☆12Jan 29, 2026Updated last month
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 3 years ago