☆18Jun 12, 2025Updated 8 months ago
Alternatives and similar repositories for cheatSheatForPentest
Users that are interested in cheatSheatForPentest are comparing it to the libraries listed below
Sorting:
- ☆17Dec 16, 2021Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Apr 19, 2021Updated 4 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 7 years ago
- ☆16Dec 15, 2021Updated 4 years ago
- Testing POC for use cases☆25Nov 24, 2024Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Dec 28, 2023Updated 2 years ago
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆17Dec 21, 2021Updated 4 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆19Mar 8, 2021Updated 4 years ago
- Simple HTTP listener for security testing☆20Oct 7, 2022Updated 3 years ago
- Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527☆19Jul 12, 2021Updated 4 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- CTF toolbox☆23Apr 2, 2023Updated 2 years ago
- Satanic Crypter A powerful tool designed to convert EXE files into BAT files with advanced features and a modern GUI interface.☆11Jan 4, 2025Updated last year
- Directory/File, DNS and VHost busting tool written in Go☆24Jan 3, 2020Updated 6 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆25Aug 1, 2022Updated 3 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆24Aug 22, 2017Updated 8 years ago
- Material For Malware Analysis Fundamentals Workshop By Eslam Abbas "Mr Robot"☆23Oct 9, 2025Updated 4 months ago
- Apple BLE research☆31Dec 1, 2019Updated 6 years ago
- just a little treasure chest of stuff I need to watch / read later☆32Mar 26, 2021Updated 4 years ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- ☆11Feb 25, 2026Updated last week
- ☆15Mar 21, 2025Updated 11 months ago
- ☆14May 14, 2022Updated 3 years ago
- Analyze your tryhackme progress!☆12May 27, 2024Updated last year
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- Tooll for sql injections scan☆11Jul 17, 2018Updated 7 years ago
- Automated pipeline for downloading, staging, ingesting, and investigating leaked and declassified archives (DDoSecrets, National Security…☆31Sep 22, 2025Updated 5 months ago
- A Golang implementation of clubby789's implementation of CVE-2021-4034☆11Jan 27, 2022Updated 4 years ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Cracking PDF password protection via hashcat.☆14Dec 24, 2025Updated 2 months ago
- Powershell scripts for exfiltration.☆12Oct 5, 2024Updated last year
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- Pimp my Kali but for lazy AFKers☆12Jun 18, 2023Updated 2 years ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 2 months ago
- Extract most frequent words in a list of subdomains☆12Feb 15, 2025Updated last year
- A tool that automates the mundane tasks of pentesting Android apps. It uses APKTool and Dex2Jar.☆11May 29, 2020Updated 5 years ago
- A comprehensive guide to becoming a hacker, covering skills, tools, and best practices to master cybersecurity and hacking techniques.☆16May 22, 2025Updated 9 months ago