hassan-salloum / Advanced-Pentesting-cheatsheet
Advanced Pentesting cheatsheet for RED & PRO
☆21Updated 8 months ago
Alternatives and similar repositories for Advanced-Pentesting-cheatsheet:
Users that are interested in Advanced-Pentesting-cheatsheet are comparing it to the libraries listed below
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated last year
- Script related in Active Directory Attacks Domain☆21Updated last year
- ☆20Updated 3 years ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆14Updated 6 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 7 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Template used for my OSCP exam.☆28Updated 2 years ago
- ☆19Updated 10 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 7 months ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆26Updated 8 months ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆12Updated last year
- Tools used for Pentesting☆22Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆39Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- ☆24Updated 5 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆23Updated 11 months ago
- ☆47Updated 2 years ago
- Offensive Security Wireless Professional☆17Updated 5 years ago
- ☆24Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- Google Meet Phishing Template For Gophish☆45Updated 2 years ago