nasnaq / jshaw87-Cheatsheets
Penetration Testing/Security Cheatsheets
☆16Updated 8 years ago
Related projects ⓘ
Alternatives and complementary repositories for jshaw87-Cheatsheets
- Various wordlists for bruteforce☆30Updated 3 years ago
- ☆11Updated 4 years ago
- A collection of awesome penetration testing resources☆14Updated 5 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆16Updated 2 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆54Updated 2 years ago
- Deploy your own lab of web application penetration testing with docker and docker-compose, webgoat, dvwap, bwapp and Juice Shop☆68Updated 3 years ago
- ☆46Updated 6 years ago
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆60Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Quick OSINT checks for IPs and Domains during triage and investigations.☆27Updated 4 months ago
- I do not own nor did I create these. I simply found publicly available cheat sheets and compiled a list for InfoSec students. This list c…☆86Updated 2 years ago
- A repository with informtion related to Cloud Osint☆80Updated 3 weeks ago
- ☆56Updated last year
- Useful collection of scapy-scripts and more☆24Updated 4 months ago
- Simple Nmap XML parsing script. Doesn't do anything fancy☆20Updated 4 years ago
- ☆17Updated 3 weeks ago
- HOCXSS (Cross Site Scripting)☆12Updated 4 years ago
- Collection of various wordlists☆31Updated 5 years ago
- ☆26Updated last year
- Penetration Testing / OSCP Biggest Reference Bank / Cheatsheet☆14Updated 5 years ago
- Modular framework to exploit UPS devices☆61Updated last year
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- karma WiFi attack implementation☆44Updated 3 weeks ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆28Updated 2 weeks ago