m0chan / pwk-cheatsheetView external linksLinks
☆53Aug 22, 2017Updated 8 years ago
Alternatives and similar repositories for pwk-cheatsheet
Users that are interested in pwk-cheatsheet are comparing it to the libraries listed below
Sorting:
- A collection of open source and commercial tools that aid in red team operations.☆49May 25, 2020Updated 5 years ago
- Combination of all my Resources, Links & Scripts☆295Aug 13, 2019Updated 6 years ago
- RepoToStoreBugBountyInfo☆370Mar 11, 2020Updated 5 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Mar 30, 2021Updated 4 years ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- Bug Hunting Handbook☆11Aug 11, 2022Updated 3 years ago
- Hash Kit is tool Programmed by me . It consist of three sections : Encoding Hash , Decoding Hash , and Identifying Hash Id .☆12Dec 5, 2021Updated 4 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- ☆11Jan 23, 2025Updated last year
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Jun 28, 2021Updated 4 years ago
- This script is to build Wazuh 4.3 environment☆11May 30, 2022Updated 3 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- Get 10k subdomains in securitytrails using cookie without apikey.☆36Oct 23, 2025Updated 3 months ago
- Here we are gather all Nuclei Templates that are Publically available.☆15Apr 28, 2024Updated last year
- ☆13May 8, 2019Updated 6 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year
- ☆46Oct 7, 2021Updated 4 years ago
- A collection of Bug Bounty Tips collected from GitHub to all bug bounty hunters☆29Dec 12, 2023Updated 2 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- Configurable, Community driven, HTTP C2 Profile☆27May 30, 2025Updated 8 months ago
- go调用最大cpu内核数实现批量ip列表tcp端口快速扫描☆15Mar 20, 2020Updated 5 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 3 months ago
- ☆29May 8, 2021Updated 4 years ago
- ☆36Feb 14, 2023Updated 3 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 6 months ago
- A Smart Log4Shell/Log4j/CVE-2021-44228 Scanner☆14Dec 22, 2021Updated 4 years ago
- Docker + Travis-CI + Cron + JohnTheRipper(Jumbo) = Bleeding edge builds☆17Mar 7, 2018Updated 7 years ago
- Tools, Resources & Helpful Tips☆14Jul 21, 2022Updated 3 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- Tool to perform Brute Force Attack FTP☆11Jan 23, 2020Updated 6 years ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15May 30, 2023Updated 2 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆25Dec 20, 2025Updated last month
- BBT - Bug Bounty Tools☆18Apr 5, 2024Updated last year