seriotonctf / my-cheat-sheetView external linksLinks
some of the commands I usually use when doing HTB machines
☆51Jan 1, 2024Updated 2 years ago
Alternatives and similar repositories for my-cheat-sheet
Users that are interested in my-cheat-sheet are comparing it to the libraries listed below
Sorting:
- ☆11Nov 12, 2023Updated 2 years ago
- string/file/shellcode encryptor using AES/XOR☆11Oct 15, 2023Updated 2 years ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 5 months ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 2 months ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- A dotnet executable to get an Entra token in an authenticated runtime☆15Oct 30, 2024Updated last year
- repo for the ctf challenges☆14Apr 20, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Cobalt Strike Beacon Object File (BOF) that uses RegConnectRegistryA + RegOpenKeyExA API to dump registry hives on remote computer☆17Mar 4, 2023Updated 2 years ago
- The Shelf is a repository containing various tools, exploits, and scripts that I’ve gathered over the years. These are small but useful u…☆33Dec 29, 2025Updated last month
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Apr 22, 2019Updated 6 years ago
- ☆13Jun 27, 2023Updated 2 years ago
- HackTheBox: Certified Bug Bounty Hunter's Writeup by Hung Thinh Tran☆13May 27, 2023Updated 2 years ago
- Just another Process Injection using Process Hollowing technique.☆19Sep 18, 2023Updated 2 years ago
- ☆15May 6, 2023Updated 2 years ago
- Sliver agents for Mythic☆48Nov 18, 2024Updated last year
- A cheatsheet for NetExec☆188Jun 9, 2025Updated 8 months ago
- ☆19Nov 28, 2024Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- ☆17Sep 14, 2017Updated 8 years ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.☆22Nov 28, 2024Updated last year
- ☆19Aug 26, 2020Updated 5 years ago
- Burp Suite Certified Practitioner Exam Study☆18Feb 8, 2023Updated 3 years ago
- ☆17Aug 12, 2024Updated last year
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆140Sep 4, 2023Updated 2 years ago
- ☆26Nov 8, 2024Updated last year
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆51Updated this week
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆226Mar 28, 2025Updated 10 months ago
- ☆59Oct 24, 2024Updated last year
- a minimalistic winrm client written in python☆25May 15, 2025Updated 8 months ago
- purplestorm writeup collection☆29Updated this week
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆21Mar 24, 2020Updated 5 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Various AD tools needed for penetration testing in one place.☆24Jul 13, 2023Updated 2 years ago
- Many times I have asked myself how to maintain access to a compromised WordPress site for the sake of surveillance/data gathering/etc... …☆26May 30, 2024Updated last year
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- windows-operating-system-archaeology @Enigma0x3 @subTee☆23Apr 22, 2017Updated 8 years ago