etc5had0w / cyberstuffLinks
This Script installs useful tools and stuff for pen-testing purpose.
☆37Updated 4 years ago
Alternatives and similar repositories for cyberstuff
Users that are interested in cyberstuff are comparing it to the libraries listed below
Sorting:
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆99Updated 4 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 5 years ago
- Python template to assist with buffer overflows☆71Updated 5 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆27Updated 4 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 4 years ago
- ☆32Updated last year
- A simple Markdown checklist for Penetration Testing with Kali Linux 2020 course exercises as part of OSCP.☆63Updated 5 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆62Updated 4 years ago
- ☆48Updated 3 years ago
- My Password Cracking Methodology☆82Updated 2 years ago
- ☆76Updated 4 years ago
- Suggests programs to run against services found during the enumeration phase of a Pentest☆95Updated last year
- ☆151Updated 2 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- Shell Please 1.0 : Reverse shell code generator.☆36Updated 3 years ago
- A Python API for Hack the Box platform interaction☆63Updated 4 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆42Updated 5 years ago
- Just a repo of random Python scripts to get pentesters started with the Python language on engagements.☆215Updated 5 years ago
- Gitbook: kashz-Jewels☆19Updated last month
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- A collection of tools, notes, & resources I've created during my OSCP certification journey.☆9Updated 4 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆56Updated 2 years ago
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆75Updated 3 years ago
- Python program to exploit stack-based buffer overflows.☆22Updated 4 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆145Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- Windows privilege escalation with cmd☆91Updated 3 years ago
- ☆82Updated 5 years ago
- Protocol agnostic online password guessing API.☆83Updated 2 years ago