ivan-sincek / penetration-testing-cheat-sheet
Work in progress...
☆704Updated 2 months ago
Alternatives and similar repositories for penetration-testing-cheat-sheet:
Users that are interested in penetration-testing-cheat-sheet are comparing it to the libraries listed below
- ☆1,077Updated last week
- ☆1,101Updated 4 years ago
- Hack-the-Box-OSCP-Preparation☆802Updated 4 years ago
- A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.☆1,124Updated last year
- ☆1,678Updated last week
- ☆1,554Updated last year
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆1,094Updated 2 weeks ago
- Collection of reverse shells for red team operations.☆490Updated last month
- A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics …☆533Updated last week
- ☆435Updated 2 years ago
- A OWASP Based Checklist With 500+ Test Cases☆729Updated 2 years ago
- Compilation of Resources for TCM's Linux Privilege Escalation course☆543Updated 4 years ago
- A Huge Learning Resources with Labs For Offensive Security Players☆958Updated 2 years ago
- My own OSCP guide☆820Updated 2 years ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆738Updated 4 years ago
- ☆1,500Updated 2 years ago
- Web recon script. No need to fear, sumrecon is here!☆375Updated 2 years ago
- Awesome Vulnerable Applications☆1,163Updated 8 months ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆440Updated 2 years ago
- Burp Suite Certified Practitioner Exam Study☆1,026Updated last month
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,325Updated 5 months ago
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,373Updated last month
- Useful Google Dorks for WebSecurity and Bug Bounty☆1,089Updated last year
- checklist for testing the web applications☆253Updated 2 years ago
- MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilitie…☆945Updated 9 months ago
- Sample pentest report provided by TCM Security☆1,183Updated 3 years ago
- These are my checklists which I use during my hunting.☆635Updated last year
- ☆338Updated 2 years ago
- Bug Bounty ~ Awesomes | Books | Cheatsheets | Checklists | Tools | Wordlists | More☆417Updated 2 years ago
- This cheatsheet was created to assist Red Teamers and Penetration Testers in hunting down vulnerabilities using "Nmap."☆677Updated 2 years ago