hackerschoice / thc-tips-tricks-hacks-cheat-sheetLinks
Various tips & tricks
☆3,510Updated this week
Alternatives and similar repositories for thc-tips-tricks-hacks-cheat-sheet
Users that are interested in thc-tips-tricks-hacks-cheat-sheet are comparing it to the libraries listed below
Sorting:
- Connect like there is no firewall. Securely.☆1,746Updated this week
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,360Updated last month
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,600Updated 6 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,801Updated 2 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,476Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,466Updated 2 years ago
- A curated list of awesome privilege escalation☆1,417Updated last month
- Red Teaming Tactics and Techniques☆4,372Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,887Updated 2 years ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,563Updated 9 months ago
- Monitor linux processes without root permissions☆5,657Updated 2 years ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,390Updated 7 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,291Updated 6 months ago
- ☆1,776Updated 3 months ago
- Fancy reverse and bind shell handler☆2,809Updated last year
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,225Updated last month
- ☆2,310Updated last year
- 🔎Searches Hash APIs to crack your hash quickly🔎 If hash is not found, automatically pipes into HashCat⚡☆1,381Updated 6 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,692Updated 3 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,889Updated 3 months ago
- A collection of all the data i could extract from 1 billion leaked credentials from internet.☆3,186Updated 5 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,919Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,811Updated last year
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,786Updated 2 years ago
- Active Directory and Internal Pentest Cheatsheets☆1,738Updated 2 weeks ago
- A script that you can run in the background!☆2,907Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,631Updated 2 months ago
- Rockyou for web fuzzing☆2,892Updated 3 weeks ago
- List of Awesome Red Teaming Resources☆7,490Updated last year
- Worlds fastest steghide cracker, chewing through millions of passwords per second☆1,179Updated last year