frizb / Hydra-CheatsheetView external linksLinks
Hydra Password Cracking Cheetsheet
☆415Oct 7, 2020Updated 5 years ago
Alternatives and similar repositories for Hydra-Cheatsheet
Users that are interested in Hydra-Cheatsheet are comparing it to the libraries listed below
Sorting:
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Hashcat Cheatsheet for OSCP☆624Apr 15, 2020Updated 5 years ago
- Single Page Cheatsheet for common MSF Venom One Liners☆307Apr 25, 2019Updated 6 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆2,045Oct 9, 2022Updated 3 years ago
- ☆1,150Apr 21, 2021Updated 4 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,815Sep 6, 2023Updated 2 years ago
- Proof of Concept for CVE-2019-18634☆233Sep 12, 2021Updated 4 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- Don't let buffer overflows overflow your mind☆448Jun 3, 2020Updated 5 years ago
- Red Teaming & Pentesting checklists for various engagements☆2,635Jul 27, 2025Updated 6 months ago
- this nuclei template finds back up files☆22Aug 25, 2025Updated 5 months ago
- Tips and Tricks for Linux Priv Escalation☆223Sep 5, 2021Updated 4 years ago
- My own OSCP guide☆848Sep 5, 2022Updated 3 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,268Feb 4, 2026Updated last week
- Some notes about Hydra for bruteforcing☆189Mar 11, 2020Updated 5 years ago
- ☆2,706Aug 7, 2024Updated last year
- Monitor linux processes without root permissions☆5,871Jan 17, 2023Updated 3 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,840Dec 25, 2023Updated 2 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- Modified template for the OSCP Exam and Labs. Used during my passing attempt☆959Jun 3, 2021Updated 4 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Oct 1, 2020Updated 5 years ago
- The ultimate WinRM shell for hacking/pentesting☆5,237Jan 9, 2026Updated last month
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom bin…☆650Aug 4, 2025Updated 6 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,888Jan 28, 2026Updated 2 weeks ago
- A pretty fast UDP port scanner☆14Feb 10, 2025Updated last year
- Windows Privilege Escalation Techniques and Scripts☆946Mar 25, 2020Updated 5 years ago
- Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report☆4,035Jul 30, 2025Updated 6 months ago
- ☆221Jul 26, 2020Updated 5 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,740Apr 25, 2024Updated last year
- JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)☆826Dec 15, 2025Updated last month
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,899Oct 29, 2025Updated 3 months ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 8 months ago
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,236Aug 20, 2024Updated last year
- ☆46Nov 5, 2025Updated 3 months ago
- A next generation version of enum4linux (a Windows/Samba enumeration tool) with additional features like JSON/YAML export. Aimed for secu…☆1,527Dec 16, 2025Updated last month
- Get GTFOBins info about a given exploit from the command line☆39Aug 4, 2024Updated last year