rayhan0x01 / my-cmd-stashView external linksLinks
Sharing my cheat-sheet of commands that I collected during prep for OSCP!
☆45Sep 28, 2020Updated 5 years ago
Alternatives and similar repositories for my-cmd-stash
Users that are interested in my-cmd-stash are comparing it to the libraries listed below
Sorting:
- Reverse Shell-able Windows exploits short POCs.☆35Sep 28, 2020Updated 5 years ago
- CLI script to use GadgetProbe as a library to generate serialized payloads of DNS callbacks to free DNSbin to probe what Java classpaths …☆14Jun 8, 2021Updated 4 years ago
- Full Antivirus Evasion for Mimikatz☆13Mar 10, 2017Updated 8 years ago
- Template project for Offensive Security Exam Documentation☆11Feb 25, 2020Updated 5 years ago
- Office 365 and Exchange domain federation enumeration tool☆13Sep 6, 2023Updated 2 years ago
- ☆13Oct 16, 2025Updated 4 months ago
- ☆14Jul 13, 2020Updated 5 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 2 years ago
- A dump of all the scripts that I make☆19Jul 4, 2021Updated 4 years ago
- ☆19Mar 16, 2021Updated 4 years ago
- The repo contains all the slide deck that was used during my presentation at various webinars, conferences, and meetups.☆57May 13, 2021Updated 4 years ago
- Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.☆25Feb 10, 2022Updated 4 years ago
- All my slides for any talks☆23Oct 13, 2024Updated last year
- ☆26Feb 6, 2026Updated last week
- ☆25Jan 12, 2023Updated 3 years ago
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆27Feb 29, 2016Updated 9 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Apr 17, 2024Updated last year
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools, …☆30Feb 22, 2023Updated 2 years ago
- Creates and sends fake meeting invite☆74Apr 24, 2021Updated 4 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆33Mar 5, 2025Updated 11 months ago
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- A simple Markdown checklist for Penetration Testing with Kali Linux 2020 course exercises as part of OSCP.☆63Jun 19, 2020Updated 5 years ago
- ☆46Jan 9, 2024Updated 2 years ago
- Powershell script to retrieve product keys and OS information from local or remote system/s.☆36Jan 18, 2019Updated 7 years ago
- Run search-that-hash from Google colab with fast offline (hashcat) mode☆35Jun 10, 2021Updated 4 years ago
- A command line tool to detect new unknown device in your network using ARP protocol☆111Feb 4, 2018Updated 8 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Oct 30, 2024Updated last year
- ☆15Aug 21, 2021Updated 4 years ago
- Debpic lets you easily build Debian packages in an isolated Docker environment.☆11Dec 6, 2024Updated last year
- ☆11Mar 25, 2024Updated last year
- my home's dotfiles☆50Oct 20, 2015Updated 10 years ago
- ☆48Oct 15, 2025Updated 4 months ago
- OpenVAS Reporting: Convert OpenVAS XML report files to reports☆160Jan 6, 2026Updated last month
- ☆37Aug 8, 2021Updated 4 years ago
- WordPress - Authenticated XXE (CVE-2021-29447)☆43Oct 4, 2021Updated 4 years ago
- ☆32Dec 28, 2023Updated 2 years ago
- ☆42Nov 5, 2025Updated 3 months ago