☆55Aug 22, 2017Updated 8 years ago
Alternatives and similar repositories for pwk-cheatsheet
Users that are interested in pwk-cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of open source and commercial tools that aid in red team operations.☆51May 25, 2020Updated 5 years ago
- Combination of all my Resources, Links & Scripts☆299Aug 13, 2019Updated 6 years ago
- RepoToStoreBugBountyInfo☆389Mar 11, 2020Updated 6 years ago
- m0chan.github.io☆89Sep 16, 2025Updated 6 months ago
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Mar 30, 2021Updated 5 years ago
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- ☆19Oct 4, 2021Updated 4 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Jun 28, 2021Updated 4 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- ☆39Nov 9, 2025Updated 4 months ago
- go调用最大cpu内核数实现批量ip列表tcp端口快速扫描☆15Mar 20, 2020Updated 6 years ago
- ☆46Oct 7, 2021Updated 4 years ago
- Tips For Bug Bounty Hunters☆86Jul 16, 2022Updated 3 years ago
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- PDF slides☆246Aug 19, 2021Updated 4 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Quickly collect data from thousands of exposed Elasticsearch or Kibana instances and generate a report to be analysed.☆30Jan 7, 2022Updated 4 years ago
- My nots from Web application Hacker's Handbook☆18Nov 22, 2021Updated 4 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Dec 29, 2017Updated 8 years ago
- Passively check for XSS character encodings☆18Mar 9, 2026Updated 2 weeks ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- Pentest Checklists☆21Aug 23, 2020Updated 5 years ago
- Repository contains an online education portal filled with web vulnerabilities.☆21Jan 3, 2020Updated 6 years ago
- 0DayList☆15Apr 4, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- This is a tool for pentesters which scan for VLANs on a network link.☆17May 12, 2015Updated 10 years ago
- Top disclosed reports from HackerOne☆10Apr 15, 2021Updated 4 years ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- Extract metadata with SSRF (Server-Side Request Forgery)☆16Jul 23, 2022Updated 3 years ago
- Get 10k subdomains in securitytrails using cookie without apikey.☆37Oct 23, 2025Updated 5 months ago
- OSCP Methodology☆57Sep 6, 2023Updated 2 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year