hslatman / cheatsheets
Personal repository with handy cheatsheets.
☆15Updated 8 years ago
Alternatives and similar repositories for cheatsheets:
Users that are interested in cheatsheets are comparing it to the libraries listed below
- Passive recon / OSINT automation script☆40Updated 6 years ago
- A few transforms and a machine for parsing Nmap XML results☆37Updated 8 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- A curated list of awesome infosec resources.☆25Updated 9 years ago
- Random collection of exploit code, tools, scripts, etc.☆27Updated 9 years ago
- Script to automate, manage, and multithread Nikto scans.☆59Updated 5 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆64Updated 7 years ago
- Network Infrastructure Penetration Testing Tool☆10Updated 10 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 9 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns by leveraging Windows Events and Sys…☆12Updated 7 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- VAPT is a Vulnerability Assessment and Penetration Testing toolkit -- a small collection of some of the common testing tools specifically…☆29Updated last month
- Maltego transform for visualizing Nessus scan data☆46Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- ☆11Updated 4 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Open Standard Vulnerability & Compliance Scanner☆43Updated 9 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- recon-ng Maltego local transform pack☆40Updated 11 years ago
- Python-based CLI Password Analyser (Reporting Tool)☆33Updated 3 years ago
- Threat Intel and Incident Reponse☆10Updated 6 years ago
- ☆30Updated 6 years ago
- ☆18Updated last year
- Plugins for the Serpico Project☆22Updated 6 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 7 years ago