hackerschoice / thc-tips-tricks-hacks-cheat-sheetLinks
Various tips & tricks
☆3,426Updated last week
Alternatives and similar repositories for thc-tips-tricks-hacks-cheat-sheet
Users that are interested in thc-tips-tricks-hacks-cheat-sheet are comparing it to the libraries listed below
Sorting:
- Connect like there is no firewall. Securely.☆1,687Updated last week
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,863Updated 2 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,428Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,271Updated 9 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,401Updated 7 months ago
- Fancy reverse and bind shell handler☆2,757Updated 9 months ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,316Updated 5 months ago
- A curated list of awesome privilege escalation☆1,351Updated 11 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,492Updated last week
- Monitor linux processes without root permissions☆5,452Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,534Updated last month
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,610Updated last year
- A collaborative, multi-platform, red teaming framework☆3,707Updated this week
- A fast, simple, recursive content discovery tool written in Rust.☆6,639Updated last month
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,509Updated last week
- Wiki to collect Red Team infrastructure hardening resources☆4,278Updated last year
- Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application☆4,727Updated 5 months ago
- List of Awesome Red Teaming Resources☆7,262Updated last year
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,191Updated 3 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,595Updated this week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,600Updated this week
- 🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes wi…☆1,563Updated 3 months ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,100Updated last week
- Adversary Emulation Framework☆9,435Updated last week
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,115Updated 2 weeks ago
- A swiss army knife for pentesting networks☆8,745Updated last year
- A script that you can run in the background!☆2,848Updated 10 months ago
- The ultimate WinRM shell for hacking/pentesting☆4,860Updated 6 months ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,207Updated 4 months ago
- A curated list of amazingly awesome Burp Extensions☆3,198Updated 3 months ago