r1cksec / cheatsheetsLinks
Collection of knowledge about information security
☆627Updated 2 weeks ago
Alternatives and similar repositories for cheatsheets
Users that are interested in cheatsheets are comparing it to the libraries listed below
Sorting:
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆483Updated last month
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆315Updated 2 years ago
- Red Team Attack Lab for TTP testing & research☆572Updated 2 years ago
- ☆410Updated 2 years ago
- ☆312Updated last year
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆568Updated 7 months ago
- Shodan Dorks 2023☆236Updated 4 months ago
- Shodan Dorks☆387Updated 3 months ago
- Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool☆791Updated last year
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆744Updated 4 months ago
- A RedTeam Toolkit☆398Updated 2 months ago
- A monster cheatsheet on MITM attacks☆355Updated this week
- Network Security Sniffer☆790Updated last month
- ☆615Updated 9 months ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆658Updated last month
- ☆543Updated last year
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆434Updated 3 months ago
- Kali noise reduction tool☆315Updated last week
- A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics …☆542Updated 2 weeks ago
- OSCP Cheatsheet by Sai Sathvik☆1,048Updated 8 months ago
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆304Updated last week
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆636Updated last year
- This page is a result of the ongoing hands-on research around advanced Linux attacks, detection and forensics techniques and tools.☆286Updated 2 years ago
- ☆477Updated 3 weeks ago
- List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting p…☆531Updated 4 months ago
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆844Updated last year
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆235Updated 2 weeks ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆389Updated 8 months ago
- Active Directory pentesting mind map☆421Updated 2 years ago
- Cover various security approaches to attack techniques and also provides new discoveries about security breaches.☆477Updated last month