sawyerf / HackSheetLinks
🥷 [CheatSheet] Useful wiki for Capture The Flag (CTF)
☆36Updated last year
Alternatives and similar repositories for HackSheet
Users that are interested in HackSheet are comparing it to the libraries listed below
Sorting:
- CTF Writeups☆59Updated last year
 - Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆279Updated 7 months ago
 - LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆301Updated last year
 - Templates for submissions☆82Updated 3 months ago
 - Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆166Updated last year
 - SecDojo 23jan CTF writeup.☆15Updated 3 years ago
 - A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆109Updated 2 years ago
 - Search & Parse Password Leaks☆403Updated last year
 - Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆143Updated 6 months ago
 - Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆151Updated last year
 - A full CTF Website Server & Frontend | Extremely customizable☆59Updated last year
 - notes and ramblings from my OSCP/PenTesting Studies☆94Updated 2 years ago
 - 🛠️ In this repository you will find all the OSCP tools I created and used during the course. 🛠️☆11Updated last year
 - TryHackMe rooms, tips and tricks, and other CTF writeups☆130Updated 2 months ago
 - A python implementation of doyensec/Session-Hijacking-Visual-Exploitation☆43Updated last year
 - Powershell commands for enumeration in Windows Active Directory environment.☆44Updated 3 years ago
 - Demonized Shell is an Advanced Tool for persistence in linux.☆421Updated 9 months ago
 - Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆129Updated last year
 - Bringing infosec community, group and leaders together that solve community challenges, problems, create cultural and provide value to In…☆193Updated 2 years ago
 - improving...☆227Updated 2 weeks ago
 - Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 7 months ago
 - PHP 8.1.0-dev Backdoor System Shell Script☆95Updated 4 years ago
 - LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆377Updated last year
 - WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆59Updated 2 years ago
 - Usefull telegram for data leaks, tutorials, free course.☆105Updated last year
 - Shodan Dorks 2023☆242Updated 9 months ago
 - Script for generating revshells☆475Updated last year
 - Write-ups / walkthroughs of 'boot to root' Capture The Flag (CTF) challenges☆54Updated 3 years ago
 - A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆79Updated 8 months ago
 - Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack and/or Telegram.☆257Updated 4 months ago