Hand list of Powershell commands frequently used during penetration tests
☆15Oct 14, 2018Updated 7 years ago
Alternatives and similar repositories for Powershell-Cheatsheet
Users that are interested in Powershell-Cheatsheet are comparing it to the libraries listed below
Sorting:
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Sep 18, 2019Updated 6 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Oct 1, 2020Updated 5 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- Tips and Tricks for Linux Priv Escalation☆226Sep 5, 2021Updated 4 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- Network Infrastructure Penetration Testing Tool☆15Oct 26, 2017Updated 8 years ago
- ☆15May 17, 2018Updated 7 years ago
- Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)☆35May 1, 2018Updated 7 years ago
- A tool that executes any command or application provisioning its environment with variables from providers (like secrets from Vault).☆11Jul 23, 2024Updated last year
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆278Oct 29, 2018Updated 7 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Single Page Cheatsheet for common MSF Venom One Liners☆308Apr 25, 2019Updated 6 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- tmp files from tmp notes as tmp-pocs... ;)☆16Jun 3, 2022Updated 3 years ago
- Community documentation for known Hack The Box v4 API endpoints☆26Oct 6, 2022Updated 3 years ago
- A list of examples and references of hacking with Bash and the Curl command☆57Feb 27, 2020Updated 6 years ago
- Blue Team Powershell Script☆18Nov 22, 2021Updated 4 years ago
- These are my notes for OSCP preparation. Hope you'll find them useful.☆14Mar 11, 2019Updated 7 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated 3 weeks ago
- Pwnage☆17Jul 1, 2025Updated 8 months ago
- ☆12Oct 16, 2017Updated 8 years ago
- Grabs data from IVRE and brings it into Obsidian notes☆36Feb 28, 2026Updated 3 weeks ago
- This package allows you to check whether an IP address belongs to a hosting provider or not. In case the IP address can be successfully l…☆21Oct 22, 2023Updated 2 years ago
- ☆26Sep 2, 2016Updated 9 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- Handy Stored Password Decryption Techniques☆164Jun 9, 2021Updated 4 years ago
- My Gitbook CyberSec Notes☆20Oct 22, 2025Updated 5 months ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- Collection of tool to find and exploit exposed SickChill/Rage instances☆18Jan 21, 2019Updated 7 years ago
- I used the Templater community plugin in obsidian to automatically populate IP,username,password☆44Sep 11, 2023Updated 2 years ago
- Windows Privilege Escalation Techniques and Scripts☆955Mar 25, 2020Updated 5 years ago
- OSCP Scripts☆14Jan 21, 2016Updated 10 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆12Jan 10, 2020Updated 6 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Nov 5, 2020Updated 5 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago