hackerschoice / thc-tips-tricks-hacks-cheat-sheetLinks
Various tips & tricks
☆3,575Updated this week
Alternatives and similar repositories for thc-tips-tricks-hacks-cheat-sheet
Users that are interested in thc-tips-tricks-hacks-cheat-sheet are comparing it to the libraries listed below
Sorting:
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,394Updated 2 months ago
- Connect like there is no firewall. Securely.☆1,780Updated 2 weeks ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,809Updated 2 weeks ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,907Updated 3 years ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆12,353Updated 2 months ago
- Monitor linux processes without root permissions☆5,784Updated 2 years ago
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,615Updated 9 months ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,786Updated last year
- A script that you can run in the background!☆2,929Updated last year
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,850Updated 2 years ago
- A curated list of amazingly awesome Burp Extensions☆3,322Updated 9 months ago
- Red Teaming Tactics and Techniques☆4,435Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,398Updated 8 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,472Updated 3 years ago
- ☆2,341Updated 2 years ago
- Linux privilege escalation auditing tool☆6,287Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,695Updated 5 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,311Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆6,943Updated last month
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,095Updated last week
- A curated list of awesome privilege escalation☆1,473Updated 3 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,305Updated last month
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,200Updated 5 years ago
- ☆1,802Updated last month
- Rockyou for web fuzzing☆2,964Updated 3 months ago
- Fancy reverse and bind shell handler☆2,850Updated last year
- Contextual Content Discovery Tool☆3,032Updated last year
- Active Directory and Internal Pentest Cheatsheets☆1,885Updated last week
- A swiss army knife for pentesting networks☆8,987Updated 2 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆4,416Updated last week