Personal repository with handy cheatsheets.
☆16Oct 23, 2016Updated 9 years ago
Alternatives and similar repositories for cheatsheets
Users that are interested in cheatsheets are comparing it to the libraries listed below
Sorting:
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- A curated list of awesome big data frameworks, ressources and other awesomeness.☆17Oct 4, 2021Updated 4 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆15Oct 4, 2021Updated 4 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Jun 3, 2016Updated 9 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆56Jan 24, 2018Updated 8 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- ☆12Jan 5, 2021Updated 5 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆25Jan 4, 2017Updated 9 years ago
- Official Black Hat Arsenal Security Tools Repository☆12Aug 3, 2017Updated 8 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- ☆13Nov 24, 2019Updated 6 years ago
- A curated list of awesome social engineering resources.☆15May 29, 2017Updated 8 years ago
- Industrial Control Systems Network Protocol Parsers (ICSNPP) - Genisys over TCP/IP☆22Nov 19, 2025Updated 3 months ago
- ics security tools☆20May 13, 2017Updated 8 years ago
- A curated list of awesome forensic analysis tools and resources☆16Oct 3, 2018Updated 7 years ago
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- A curated list of awesome malware analysis tools and resources☆45Jul 17, 2020Updated 5 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- ☆25Dec 10, 2018Updated 7 years ago
- ☆19Oct 30, 2020Updated 5 years ago
- Tool designed to study the answers of your DNS resolver and make easier the identification of techniques such as DNS Hijacking/Poisoning☆27Jan 6, 2019Updated 7 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- PowerShell 'Hero': scripts for DFIR and automation with a PowerShell menu example.☆37Jul 11, 2023Updated 2 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆30Jun 11, 2019Updated 6 years ago
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆34Oct 7, 2025Updated 5 months ago
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- Draft and review content for MoJ IT Policy.☆11Sep 2, 2020Updated 5 years ago
- NmapPy - Python implementation of Nmap☆35Nov 27, 2018Updated 7 years ago
- A preconfigured Windows-based system designed for rapid forensic investigations in both Azure and AWS.☆39Mar 25, 2024Updated last year
- A quick and easy PowerShell script to collect a packet trace with option to convert .etl to .pcap.☆40Oct 26, 2022Updated 3 years ago
- DuckyTails is a interpreter that runs Ducky Scripts from any pendrive. You don't need a USB Rubber Ducky☆12Sep 29, 2018Updated 7 years ago
- Most Popular Attack and Defend Competitive A/D mode for 5 years!☆12Feb 5, 2018Updated 8 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago