sawyerf / HackSheetLinks
🥷 [CheatSheet] Useful wiki for Capture The Flag (CTF)
☆35Updated 2 years ago
Alternatives and similar repositories for HackSheet
Users that are interested in HackSheet are comparing it to the libraries listed below
Sorting:
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆258Updated 9 months ago
- A python implementation of doyensec/Session-Hijacking-Visual-Exploitation☆43Updated 2 years ago
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆162Updated last year
- A full CTF Website Server & Frontend | Extremely customizable☆58Updated last year
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆299Updated 2 years ago
- Script for generating revshells☆479Updated last year
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆114Updated 2 years ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.☆208Updated last year
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆171Updated 2 years ago
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆145Updated 9 months ago
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆160Updated last year
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆240Updated last year
- Virtualized WiFi pentesting laboratory without the need for physical Wi-Fi cards, using mac80211_hwsim. Docker version of WiFiChallenge L…☆356Updated this week
- A Zphisher GUI Back-Office Plugin☆235Updated 2 years ago
- SQL Injection Vulnerability Scanner made with Python☆381Updated 10 months ago
- Network brute force tool, written in Python. Faster than other existing solutions (including the main leader in the network brute force m…☆413Updated 4 years ago
- A wordlist repository with human-curated and reviewed content.☆122Updated 2 years ago
- Templates for submissions☆95Updated 6 months ago
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆95Updated 4 months ago
- Powershell commands for enumeration in Windows Active Directory environment.☆46Updated 3 years ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆131Updated last year
- Personal CheatSheet used for the exam made with Obsidian, download the repo and use the resources within Obsidian for a better experience…☆45Updated 2 years ago
- Local File Inclusion discovery and exploitation tool☆332Updated last year
- improving...☆252Updated 3 months ago
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆293Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Updated 5 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆378Updated 2 years ago
- ⚡ Dynamically generated your Root-me.org stats for your github readmes☆23Updated last year
- Web Security Scanner☆370Updated 2 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Updated last year