Various tips & tricks
☆3,809Mar 25, 2026Updated 2 weeks ago
Alternatives and similar repositories for thc-tips-tricks-hacks-cheat-sheet
Users that are interested in thc-tips-tricks-hacks-cheat-sheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Connect like there is no firewall. Securely.☆1,844Mar 25, 2026Updated 2 weeks ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆320Mar 15, 2026Updated 3 weeks ago
- ☆423Dec 3, 2025Updated 4 months ago
- The Havoc Framework☆8,266Dec 18, 2025Updated 3 months ago
- Customizable Linux Persistence Tool for Security Research and Detection Engineering.☆861Feb 25, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆351May 25, 2023Updated 2 years ago
- One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️☆6,462Mar 28, 2026Updated last week
- Adversary Emulation Framework☆10,958Apr 2, 2026Updated last week
- The Network Execution Tool☆5,393Updated this week
- This map lists the essential techniques to bypass anti-virus and EDR☆3,181Mar 28, 2025Updated last year
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7,416Mar 25, 2026Updated 2 weeks ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,424Feb 15, 2026Updated last month
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,614Apr 1, 2026Updated last week
- Impacket is a collection of Python classes for working with network protocols.☆15,593Mar 30, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Extract credentials from lsass remotely☆2,190Mar 23, 2026Updated 2 weeks ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,654Aug 28, 2025Updated 7 months ago
- game of active directory☆7,669Mar 12, 2026Updated 3 weeks ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,565Jan 18, 2026Updated 2 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,678Mar 16, 2026Updated 3 weeks ago
- List of Awesome Red Teaming Resources☆7,867Dec 28, 2023Updated 2 years ago
- A collaborative, multi-platform, red teaming framework☆4,399Mar 30, 2026Updated last week
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,882Aug 18, 2023Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,467Oct 1, 2025Updated 6 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆11,141Updated this week
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,106Updated this week
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,944Oct 7, 2023Updated 2 years ago
- Tools and Techniques for Red Team / Penetration Testing☆8,617Mar 18, 2025Updated last year
- Zaps arguments and environment from the process list☆250Apr 26, 2024Updated last year
- Fast web fuzzer written in Go☆15,866Apr 24, 2025Updated 11 months ago
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,799Updated this week
- ↕️🤫 Stealth redirector for your red team operation security☆1,068Mar 1, 2026Updated last month
- A swiss army knife for pentesting networks☆9,117Dec 6, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,857Mar 23, 2026Updated 2 weeks ago
- Red Teaming Tactics and Techniques☆4,520Aug 22, 2024Updated last year
- In-depth attack surface mapping and asset discovery☆14,353Apr 1, 2026Updated last week
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆8,434Mar 16, 2026Updated 3 weeks ago
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,376Oct 27, 2023Updated 2 years ago
- A fast, simple, recursive content discovery tool written in Rust.☆7,633Feb 8, 2026Updated 2 months ago
- The recursive internet scanner for hackers. 🧡☆9,583Updated this week