rmusser01 / Cheatsheets
Penetration Testing/Security Cheatsheets
☆191Updated 8 years ago
Related projects: ⓘ
- ☆97Updated this week
- ☆137Updated this week
- Basics of Windows privilege escalation☆132Updated 6 years ago
- ☆58Updated this week
- ☆74Updated this week
- ☆83Updated this week
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 7 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆159Updated 5 years ago
- ☆52Updated 4 years ago
- ☆84Updated this week
- ☆92Updated 6 years ago
- ☆86Updated this week
- Miscellaneous pentesting scripts for OSCP☆57Updated 5 years ago
- ☆122Updated 6 years ago
- ☆36Updated this week
- Python Tool for Host Enumeration☆50Updated 7 years ago
- DefCon24☆119Updated 8 years ago
- ☆57Updated this week
- Extreme Vulnerable Node Application☆94Updated 5 years ago
- Penetration testing scripts☆143Updated 6 years ago
- ☆316Updated this week
- ☆40Updated this week
- ☆30Updated this week
- Generates a Windows 'vulnerable' machine from ISOs☆89Updated 10 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆145Updated 5 years ago
- Slides from various talks that I've given over the years☆117Updated last year
- Hacking challenges☆32Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆124Updated 6 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆54Updated 5 years ago