https://github.com/OlivierLaflamme/Cheatsheet-God
☆18Jul 10, 2021Updated 4 years ago
Alternatives and similar repositories for OlivierLaflamme-Cheatsheet-God
Users that are interested in OlivierLaflamme-Cheatsheet-God are comparing it to the libraries listed below
Sorting:
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15May 30, 2023Updated 2 years ago
- Scrapes names from LinkedIn companies and creates a list of email addresses from them.☆11Oct 3, 2020Updated 5 years ago
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Mar 28, 2025Updated 11 months ago
- https://github.com/ManhNho/AWAE-OSWE☆11Aug 1, 2020Updated 5 years ago
- Go(od) Job is a simple job scheduler that supports task retries, logging, and task sharding.☆12Sep 10, 2024Updated last year
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Default locations for files on various Linux distros.☆10May 12, 2021Updated 4 years ago
- A rust proof of concept to demonstrate registry overwriting via RegRestoreKey using the Offline Registry Library☆24Nov 13, 2025Updated 3 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 2 months ago
- A lightweight version of my bug bounty hunting framework designed to be run on Synack's LP+ machines.☆12Jul 11, 2023Updated 2 years ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated 2 weeks ago
- ☆14Jan 7, 2023Updated 3 years ago
- A Vulnerablity Radar That Runs With GIthub Actions☆45Updated this week
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- AADInternals Authenticator Android App☆11Jul 2, 2020Updated 5 years ago
- TurboFuzzLLM: Turbocharging Mutation-based Fuzzing for Effectively Jailbreaking Large Language Models in Practice☆22Nov 24, 2025Updated 3 months ago
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 3 years ago
- Make AWS IAM policies smaller by adding wildcards to actions.☆19Mar 2, 2026Updated last week
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Mar 2, 2021Updated 5 years ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- ☆14Jun 2, 2025Updated 9 months ago
- Classic Bofa adapted to CobaltStrike.☆11Oct 4, 2022Updated 3 years ago
- ☆21Feb 18, 2025Updated last year
- Optimize long AWS IAM policies by strategically using wildcards, reducing the number of characters, and maintaining the intended scope of…☆15Nov 14, 2024Updated last year
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- ☆14Dec 26, 2024Updated last year
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Interview questions for SOC Analyst, Sec Engineering, etc☆16Apr 27, 2024Updated last year
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- ☆14Apr 16, 2022Updated 3 years ago
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago
- Confluence Hardcoded Password POC☆15Jul 30, 2022Updated 3 years ago
- A lightweight test harness designed to speed up shellcode development by providing an execution environment with integrated crash diagnos…☆43Jan 15, 2026Updated last month
- ☆17May 7, 2025Updated 10 months ago
- ☆19Feb 13, 2026Updated 3 weeks ago
- ☆19Oct 2, 2022Updated 3 years ago
- web shell,php shell ,bypass shell , web hack,symlink☆13May 15, 2019Updated 6 years ago
- ☆17Feb 23, 2026Updated 2 weeks ago