📑 A collection of cheatsheets for pentesting tools
☆17Feb 24, 2021Updated 5 years ago
Alternatives and similar repositories for Hacking-cheatsheet
Users that are interested in Hacking-cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- install the latest version of the DrakFly-Tool V.3.0, 378 Tool for Hacking☆16Jan 19, 2023Updated 3 years ago
- Understanding Linux in brief, guide for Command Line Interface, Troubleshoot☆12Dec 19, 2021Updated 4 years ago
- Public Profile☆19Jan 18, 2021Updated 5 years ago
- a script designed to help identify vulnerabilities and misconfigurations on a Linux system☆19Dec 31, 2022Updated 3 years ago
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Notes only☆20May 2, 2022Updated 3 years ago
- 🔐 Google Chrome password recovery tool written using Powershell and a tiny bit of Batch!☆16Jul 15, 2019Updated 6 years ago
- This is the simplest android Keylogger for education and research only. Updates and support are there☆21Jun 10, 2024Updated last year
- This repository contains the files that provide the upload functionality in the IIS Server☆36Aug 4, 2021Updated 4 years ago
- A collection of malware/viruses/spyware code (not for real use) designed to teach malware analysis☆17Nov 30, 2024Updated last year
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆36May 18, 2020Updated 5 years ago
- The USB Rubber Ducky is a discrete miniature keyboard that is disguised as a regular USB Storage Device. This page provides the payload …☆16Apr 21, 2019Updated 6 years ago
- ☆31May 31, 2022Updated 3 years ago
- OWASP Foundation Web Respository☆44Oct 8, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆50Mar 30, 2021Updated 5 years ago
- Ultimate Package Of 50 Bug Bounty Hunting Tools☆47Oct 3, 2025Updated 5 months ago
- Full Valid Fake Data Generator☆103Sep 27, 2024Updated last year
- Remote Command executor☆83Mar 11, 2023Updated 3 years ago
- I collected it to help the bug hunter get a reward☆56Sep 7, 2022Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆85Nov 7, 2020Updated 5 years ago
- This Repo will help you to prepare better for CEH - Practical Exam☆53Jun 2, 2025Updated 9 months ago
- ☆73Apr 18, 2021Updated 4 years ago
- CloudNative Microservices, Container, Orchestators, Service Mesh, CI/CD, IaC, GitOps, Monitoring. Learn, explore, design and develop +20 …☆92Mar 9, 2026Updated 3 weeks ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Misc notes from Google's Cybersecurity Professional Certificate☆82Aug 6, 2024Updated last year
- A compiled list of tools for reconnaissance and footprinting☆165Aug 28, 2024Updated last year
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆108Sep 6, 2023Updated 2 years ago
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆127Jan 19, 2023Updated 3 years ago
- ☆77Sep 27, 2024Updated last year
- ☆70Jun 16, 2022Updated 3 years ago
- Exploit for the CVE-2023-23397☆160Mar 15, 2023Updated 3 years ago
- A wordlist repository with human-curated and reviewed content.☆126Oct 24, 2023Updated 2 years ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆475Mar 14, 2026Updated 2 weeks ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆156Mar 14, 2026Updated 2 weeks ago
- Tutorials and Things to Do while Hunting Vulnerability.☆91Jan 14, 2022Updated 4 years ago
- All Type of Payloads☆142Mar 26, 2024Updated 2 years ago
- ☆114Mar 10, 2026Updated 2 weeks ago
- Execute shellcode from a remote-hosted bin file using Winhttp.☆238Jun 22, 2023Updated 2 years ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆122Sep 19, 2023Updated 2 years ago
- Google IP Search Engine☆162Apr 29, 2022Updated 3 years ago