hackerschoice / thc-tips-tricks-hacks-cheat-sheetLinks
Various tips & tricks
☆3,482Updated last month
Alternatives and similar repositories for thc-tips-tricks-hacks-cheat-sheet
Users that are interested in thc-tips-tricks-hacks-cheat-sheet are comparing it to the libraries listed below
Sorting:
- Connect like there is no firewall. Securely.☆1,720Updated last month
- ☆1,757Updated 2 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,343Updated 2 weeks ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,879Updated 2 years ago
- Rockyou for web fuzzing☆2,862Updated 2 weeks ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,354Updated 5 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,629Updated 2 months ago
- A curated list of awesome privilege escalation☆1,388Updated last year
- A curated list of amazingly awesome Burp Extensions☆3,254Updated 5 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,178Updated this week
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,583Updated 5 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,505Updated last month
- Arsenal is just a quick inventory and launcher for hacking programs☆3,505Updated 8 months ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,683Updated last year
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,762Updated this week
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,270Updated 10 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,459Updated 2 years ago
- GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems☆11,950Updated 9 months ago
- Active Directory and Internal Pentest Cheatsheets☆1,663Updated last week
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,523Updated last year
- Red Teaming Tactics and Techniques☆4,334Updated 11 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,802Updated last year
- A curated list of various bug bounty tools☆5,222Updated 3 weeks ago
- Linux privilege escalation auditing tool☆6,105Updated last year
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,820Updated 2 weeks ago
- A script that you can run in the background!☆2,876Updated last year
- Network Analysis Tool☆3,267Updated 2 years ago
- Monitor linux processes without root permissions☆5,592Updated 2 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,914Updated last year
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,756Updated 2 years ago