hackerschoice / thc-tips-tricks-hacks-cheat-sheetLinks
Various tips & tricks
☆3,743Updated last week
Alternatives and similar repositories for thc-tips-tricks-hacks-cheat-sheet
Users that are interested in thc-tips-tricks-hacks-cheat-sheet are comparing it to the libraries listed below
Sorting:
- Connect like there is no firewall. Securely.☆1,799Updated 2 months ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,666Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,870Updated 2 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,921Updated 3 years ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,886Updated 2 years ago
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,426Updated last year
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,844Updated last month
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,232Updated last month
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,419Updated 3 months ago
- A fast, simple, recursive content discovery tool written in Rust.☆7,457Updated last week
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,464Updated last month
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,384Updated last month
- Active Directory and Internal Pentest Cheatsheets☆2,008Updated this week
- Network Analysis Tool☆3,324Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,475Updated 3 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,629Updated last month
- A script that you can run in the background!☆3,015Updated last year
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,940Updated 2 years ago
- ☆2,361Updated 2 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,530Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,128Updated this week
- A curated list of amazingly awesome Burp Extensions☆3,354Updated 11 months ago
- Red Teaming Tactics and Techniques☆4,474Updated last year
- ☆1,843Updated 2 weeks ago
- A curated list of awesome privilege escalation☆1,506Updated 5 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,892Updated 3 months ago
- Homemade Pwnbox / Rogue AP based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap☆1,988Updated last year
- Rockyou for web fuzzing☆2,998Updated 5 months ago
- Fancy reverse and bind shell handler☆2,864Updated last year
- Monitor linux processes without root permissions☆5,860Updated 3 years ago