nasnaq / jshaw87-Cheatsheets
Penetration Testing/Security Cheatsheets
☆16Updated 9 years ago
Alternatives and similar repositories for jshaw87-Cheatsheets:
Users that are interested in jshaw87-Cheatsheets are comparing it to the libraries listed below
- ☆11Updated 4 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆16Updated 3 years ago
- Various wordlists for bruteforce☆32Updated 3 years ago
- Bundle of wordlists for brute-forcing subdomains (World + RUSSIA based).☆65Updated 6 years ago
- ☆46Updated 7 years ago
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆59Updated 4 years ago
- Python Script for Telegram Bot is specially built for pentest & bug bounty. It's like a telegram shell.☆54Updated 3 years ago
- A collection of awesome penetration testing resources☆14Updated 6 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Collection of various wordlists☆32Updated 5 years ago
- #crypto #cipher #encode #decode #hash☆51Updated 3 years ago
- Simple Nmap XML parsing script. Doesn't do anything fancy☆19Updated 4 years ago
- HOCXSS (Cross Site Scripting)☆12Updated 4 years ago
- ☆14Updated 5 years ago
- Security checks for your researches☆33Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆144Updated 3 years ago
- best framework for information gathering ,pentesting and web aplication scanner☆9Updated 6 years ago
- Penetration Testing with Kali Linux☆22Updated 5 years ago
- Collection of extra pentest tools for Kali Linux☆102Updated last year
- I do not own nor did I create these. I simply found publicly available cheat sheets and compiled a list for InfoSec students. This list c…☆88Updated 2 years ago
- ☆67Updated 6 years ago
- A shell script that automatically performs a series of *NIX enumeration tasks.☆40Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated last year
- Reconnaissance and Enumeration automation script☆52Updated 3 years ago
- A tool that automates MAC address and hostname spoofing☆59Updated 5 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆63Updated last year
- Customized Kali Linux - Ansible playbook☆64Updated 4 years ago
- Robust and blazing fast open-redirect vulnerability scanner with ability of recursevely crawling all of web-forms, entry points, or links…☆39Updated 2 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆18Updated 5 years ago