π A collection of cheatsheets for pentesting tools
β17Feb 24, 2021Updated 5 years ago
Alternatives and similar repositories for Hacking-cheatsheet
Users that are interested in Hacking-cheatsheet are comparing it to the libraries listed below
Sorting:
- Understanding Linux in brief, guide for Command Line Interface, Troubleshootβ12Dec 19, 2021Updated 4 years ago
- All Labs of the Security for Developers Trainingβ10Feb 10, 2023Updated 3 years ago
- β26Jun 17, 2024Updated last year
- β18Feb 26, 2017Updated 9 years ago
- a script designed to help identify vulnerabilities and misconfigurations on a Linux systemβ19Dec 31, 2022Updated 3 years ago
- Notes onlyβ19May 2, 2022Updated 3 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1β26Feb 1, 2020Updated 6 years ago
- β31May 31, 2022Updated 3 years ago
- This repository contains the files that provide the upload functionality in the IIS Serverβ34Aug 4, 2021Updated 4 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windowsβ34May 18, 2020Updated 5 years ago
- OWASP Foundation Web Respositoryβ44Oct 8, 2025Updated 5 months ago
- Misc notes from Google's Cybersecurity Professional Certificateβ81Aug 6, 2024Updated last year
- β46Jul 9, 2024Updated last year
- Ultimate Package Of 50 Bug Bounty Hunting Toolsβ47Oct 3, 2025Updated 5 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ48Mar 30, 2021Updated 4 years ago
- This Repo will help you to prepare better for CEH - Practical Examβ54Jun 2, 2025Updated 9 months ago
- I collected it to help the bug hunter get a rewardβ57Sep 7, 2022Updated 3 years ago
- β70Jun 16, 2022Updated 3 years ago
- β77Sep 27, 2024Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploiβ¦β83Nov 7, 2020Updated 5 years ago
- SOAR Automation with Shuffle, Wazuh & TheHive | This project integrates Shuffle SOAR, Wazuh SIEM, and TheHive to automate security incideβ¦β124Feb 21, 2025Updated last year
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.β108Sep 6, 2023Updated 2 years ago
- Tutorials and Things to Do while Hunting Vulnerability.β91Jan 14, 2022Updated 4 years ago
- β114Nov 12, 2025Updated 3 months ago
- A curated list of free OSINT tools β‘οΈβ182Feb 27, 2026Updated last week
- POC for CVE-2022-47966 affecting multiple ManageEngine productsβ127Jan 19, 2023Updated 3 years ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.β470Oct 23, 2022Updated 3 years ago
- Static code extraction. Zero-runtime CSS-in-TS `<Box />` -> became a part of Panda CSSβ127Jun 19, 2023Updated 2 years ago
- Script to generate malicious debian packages (debain trojans).β120Apr 24, 2019Updated 6 years ago
- A compiled list of tools for reconnaissance and footprintingβ163Aug 28, 2024Updated last year
- The purpose of #Learn365 collection is to create informational content in multiple codecs and share with the community to allow knowledgeβ¦β103May 25, 2022Updated 3 years ago
- β143Oct 23, 2022Updated 3 years ago
- All Type of Payloadsβ141Mar 26, 2024Updated last year
- Exploit for the CVE-2023-23397β160Mar 15, 2023Updated 2 years ago
- This is a simple python tool to automatically deface webdav vulnerable websites.β169Dec 13, 2024Updated last year
- Bruteforce the Android Passcode given the hash and salt.β190Feb 10, 2023Updated 3 years ago
- β210Oct 23, 2022Updated 3 years ago
- Execute shellcode from a remote-hosted bin file using Winhttp.β240Jun 22, 2023Updated 2 years ago
- A simple tool for bypassing file upload restrictions.β893Jul 22, 2024Updated last year