hackerschoice / thc-tips-tricks-hacks-cheat-sheetLinks
Various tips & tricks
☆3,710Updated this week
Alternatives and similar repositories for thc-tips-tricks-hacks-cheat-sheet
Users that are interested in thc-tips-tricks-hacks-cheat-sheet are comparing it to the libraries listed below
Sorting:
- Connect like there is no firewall. Securely.☆1,788Updated last month
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,410Updated 2 months ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,629Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,907Updated 3 years ago
- Fancy reverse and bind shell handler☆2,858Updated last year
- Red Teaming Tactics and Techniques☆4,456Updated last year
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,862Updated 2 years ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,148Updated 3 weeks ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,472Updated 3 years ago
- ☆2,350Updated 2 years ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,836Updated last month
- Tools & Interesting Things for RedTeam Ops☆2,243Updated 6 months ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,621Updated last week
- The Network Execution Tool☆5,052Updated this week
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,421Updated 3 months ago
- Monitor linux processes without root permissions☆5,813Updated 2 years ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,432Updated last week
- A curated list of awesome privilege escalation☆1,491Updated 4 months ago
- Active Directory and Internal Pentest Cheatsheets☆1,941Updated last month
- Fully featured and community-driven hacking environment☆2,781Updated this week
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,813Updated 2 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,882Updated last month
- ☆1,812Updated last month
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,346Updated last week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,968Updated 9 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,726Updated 6 months ago
- Red Teaming & Pentesting checklists for various engagements☆2,626Updated 5 months ago
- Hardware/IOT Pentesting Wiki☆781Updated last month
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,834Updated 2 weeks ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,518Updated 2 years ago