Useful commands/tricks using smbclient/nmap in a pentesting/auditing/redteaming
☆115Apr 17, 2022Updated 3 years ago
Alternatives and similar repositories for smbclient_cheatsheet
Users that are interested in smbclient_cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- ☆15Nov 4, 2020Updated 5 years ago
- Mythic C2 CheatSheet for OSEP☆62Jan 21, 2026Updated 2 months ago
- Maintained by the ANY.RUN team, this repository provides YARA rules to help detect and classify various malware families and other malici…☆26Nov 1, 2025Updated 4 months ago
- A docker image for the Gophish web application☆18Jul 10, 2019Updated 6 years ago
- Linux password crack☆14Apr 11, 2022Updated 3 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Jun 9, 2022Updated 3 years ago
- ☆75Mar 24, 2021Updated 5 years ago
- ☆11Dec 17, 2023Updated 2 years ago
- ☆13Mar 7, 2025Updated last year
- XSS Payloads☆20Sep 21, 2017Updated 8 years ago
- Commands used in Windows penetration tests☆56Jan 19, 2026Updated 2 months ago
- ☆14Sep 28, 2023Updated 2 years ago
- Kamus Besar Bahasa Indonesia☆11Aug 26, 2025Updated 6 months ago
- A tutorial on using JohnTheRipper and Hashcat to crack lost keepass passwords☆81Apr 30, 2021Updated 4 years ago
- Windows Reverse TCP backdoor☆28Apr 28, 2019Updated 6 years ago
- LXD Image: Alpine 3.7 (Apache, PHP5.6)☆13Apr 5, 2018Updated 7 years ago
- Tool to scrape LinkedIn☆10Mar 16, 2017Updated 9 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Jun 23, 2020Updated 5 years ago
- MODBUS Penetration Testing Framework☆11Mar 27, 2019Updated 6 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Sep 4, 2024Updated last year
- C# Data Collector for BloodHound☆1,224Updated this week
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,366Feb 15, 2026Updated last month
- ☆13Jul 19, 2017Updated 8 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids.☆33Jul 1, 2018Updated 7 years ago
- Exam Report Template - eWPT☆24Oct 18, 2021Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆214Apr 11, 2020Updated 5 years ago
- ☆2,748Aug 7, 2024Updated last year
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆15Feb 25, 2021Updated 5 years ago
- See the history of a file from above☆17Aug 1, 2017Updated 8 years ago
- ☆18Jul 26, 2021Updated 4 years ago
- A command line tool to search AttackerKB.☆54Jan 16, 2021Updated 5 years ago
- CVE-2021-22205 RCE☆13Jul 4, 2022Updated 3 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- ☆12Dec 10, 2020Updated 5 years ago
- Stupid Simple Detection Testing☆13Mar 7, 2024Updated 2 years ago
- Router Vulnerabilities Scanner☆14Jun 1, 2020Updated 5 years ago
- Chrome Extension for XSS Hunter Payloads☆14Sep 7, 2016Updated 9 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Jul 29, 2020Updated 5 years ago