Not The Hidden Wiki - The largest repository of links related to cybersecurity
☆1,889Mar 1, 2026Updated last week
Alternatives and similar repositories for NTHW
Users that are interested in NTHW are comparing it to the libraries listed below
Sorting:
- OSWE, OSEP, OSED, OSEE☆3,770Jan 2, 2026Updated 2 months ago
- game of active directory☆7,505Updated this week
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,317Nov 12, 2025Updated 3 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,049Feb 26, 2026Updated last week
- PEN-300 collection to help you on your exam.☆697Feb 25, 2026Updated last week
- HackTheBox Certified Penetration Tester Specialist Cheatsheet☆702Jul 10, 2024Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆4,325Feb 15, 2026Updated 3 weeks ago
- Tools and Techniques for Red Team / Penetration Testing☆8,548Mar 18, 2025Updated 11 months ago
- RustRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Rust☆1,834Dec 29, 2025Updated 2 months ago
- ☆682Feb 28, 2026Updated last week
- Complete Solution for VAPT/AppSec and Pentesting Guide: Web | Mobile | API | Thick Client | Source Code Review | DevSecOps | Wireless | …☆1,475Mar 1, 2026Updated last week
- Collection of Notes and CheatSheets used for Red teaming Certs☆494Feb 13, 2023Updated 3 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,511Jan 18, 2026Updated last month
- Centralized resource for listing and organizing known injection techniques and POCs☆681Feb 1, 2026Updated last month
- Powerview on steroids☆890Updated this week
- Windows Local Privilege Escalation Cookbook☆1,281Feb 5, 2026Updated last month
- The Network Execution Tool☆5,296Feb 27, 2026Updated last week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,158Sep 29, 2025Updated 5 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,166Mar 28, 2025Updated 11 months ago
- Burp Suite Certified Practitioner Exam Study☆1,325Feb 5, 2026Updated last month
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,371Updated this week
- OSCP Cheat Sheet☆3,649Updated this week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆75,690Mar 2, 2026Updated last week
- Rust for malware Development is a repository for advanced Red Team techniques and offensive malwares & Ransomwares, focused on Rust 🦀☆3,319Updated this week
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,677Jun 22, 2025Updated 8 months ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,183Feb 23, 2026Updated 2 weeks ago
- The Havoc Framework☆8,203Dec 18, 2025Updated 2 months ago
- OSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines☆1,072Jan 25, 2026Updated last month
- Multiplayer pivoting solution☆489Nov 3, 2025Updated 4 months ago
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,394Nov 24, 2025Updated 3 months ago
- RunPE implementation with multiple evasive techniques (2)☆275Sep 25, 2025Updated 5 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,158Updated this week
- Dominate Active Directory with PowerShell.☆1,166Nov 28, 2025Updated 3 months ago
- Orange Cyberdefense mindmaps☆1,533Mar 10, 2025Updated 11 months ago
- My Notes about Penetration Testing☆730Jan 17, 2026Updated last month
- ☆10Dec 25, 2023Updated 2 years ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆299Jul 31, 2024Updated last year
- A sophisticated, covert Windows-based credential dumper using C++ and MASM x64.☆443Jul 8, 2024Updated last year
- Various resources to enhance Cobalt Strike's functionality and its ability to evade antivirus/EDR detection☆323May 17, 2024Updated last year