Hand list of Powershell commands frequently used during penetration tests
☆15Oct 14, 2018Updated 7 years ago
Alternatives and similar repositories for Powershell-Cheatsheet
Users that are interested in Powershell-Cheatsheet are comparing it to the libraries listed below
Sorting:
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Sep 18, 2019Updated 6 years ago
- Tips and Tricks for Linux Priv Escalation☆225Sep 5, 2021Updated 4 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Drupal < 7.58 - Drupalgeddon 3 Authenticated Remote Code Execution (Metasploit)☆35May 1, 2018Updated 7 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated 11 months ago
- ☆15May 17, 2018Updated 7 years ago
- Grabs data from IVRE and brings it into Obsidian notes☆36Updated this week
- Collection of tool to find and exploit exposed SickChill/Rage instances☆18Jan 21, 2019Updated 7 years ago
- ☆26Sep 2, 2016Updated 9 years ago
- tmp files from tmp notes as tmp-pocs... ;)☆16Jun 3, 2022Updated 3 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Blue Team Powershell Script☆18Nov 22, 2021Updated 4 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Single Page Cheatsheet for common MSF Venom One Liners☆308Apr 25, 2019Updated 6 years ago
- OSCP Scripts☆14Jan 21, 2016Updated 10 years ago
- I used the Templater community plugin in obsidian to automatically populate IP,username,password☆44Sep 11, 2023Updated 2 years ago
- All the useful tools interesting to be used☆24Sep 20, 2022Updated 3 years ago
- ☆19Apr 29, 2019Updated 6 years ago
- Joomla! Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion in Python3☆24Feb 27, 2023Updated 3 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Nov 5, 2020Updated 5 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- ☆23Jan 18, 2021Updated 5 years ago
- A collection of notes and script that will help you learn basics of hacking with Python☆34Nov 3, 2014Updated 11 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆279Oct 29, 2018Updated 7 years ago
- Pentesting resources☆23May 3, 2019Updated 6 years ago
- Tools for passing OSCP☆40Nov 21, 2025Updated 3 months ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆32Nov 17, 2019Updated 6 years ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆34Feb 9, 2025Updated last year
- This script will bruteforce the credential of tomcat manager or host-manager☆32Jun 24, 2020Updated 5 years ago
- Community documentation for known Hack The Box v4 API endpoints☆26Oct 6, 2022Updated 3 years ago
- Files for my Python3 Create Your Own Tool Series☆25Jul 21, 2022Updated 3 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Feb 19, 2020Updated 6 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- ☆32Oct 21, 2023Updated 2 years ago