List of commands and techniques to while conducting any kind of hacking :)
☆136Oct 14, 2023Updated 2 years ago
Alternatives and similar repositories for Hacking-Cheatsheet
Users that are interested in Hacking-Cheatsheet are comparing it to the libraries listed below
Sorting:
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- ☆13May 8, 2019Updated 6 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆46Nov 5, 2025Updated 4 months ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- ☆12Feb 20, 2025Updated last year
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- Sweetuu is a Advance Shell which can be used to achieve RCE easily through LFI & RFI. For easy wins in bug bounty, upload sweetuu instead…☆10Dec 16, 2024Updated last year
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Apr 25, 2021Updated 4 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 3 years ago
- ptrace misconfiguration Local Privilege Escalation☆13Aug 11, 2023Updated 2 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- Cheatsheet collection of Infosec tools☆15May 18, 2019Updated 6 years ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆36Dec 23, 2019Updated 6 years ago
- Precompiled binaries for various projects☆12Nov 6, 2020Updated 5 years ago
- bug bounty automation☆13Jul 2, 2021Updated 4 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- ☆32Aug 12, 2021Updated 4 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 7 months ago
- ⚡ Golang library for quick make pentest tools☆15Apr 7, 2025Updated 11 months ago
- Laz-y project compatible C# templates for shellcode injection.☆20May 1, 2022Updated 3 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 9 months ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- ☆36Jun 23, 2022Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Mar 27, 2024Updated last year
- ☆17Apr 5, 2021Updated 4 years ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 8 years ago
- Scrapes information on vulnerabilities from US-CERT and parses them for further usage☆17Jun 23, 2020Updated 5 years ago
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- Hashcat Cheatsheet for OSCP☆626Apr 15, 2020Updated 5 years ago
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago