☆12Aug 22, 2017Updated 8 years ago
Alternatives and similar repositories for pwk-cheatsheet
Users that are interested in pwk-cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kali Linux Cheat Sheet☆15Jan 23, 2023Updated 3 years ago
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- An online review webscraper that adapts to various HTML topologies☆11Jul 22, 2024Updated last year
- A terminal plugin to make Kali Linux objectively better - compatible with ohmyzsh☆18Jan 23, 2024Updated 2 years ago
- A user-friendly app for tracking business expenses and revenue, designed to simplify financial management for entrepreneurs and small bus…☆13Dec 8, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An automated script to create as many free Netflix accounts as you want. THIS HAS BEEN PATCHED.☆24Aug 26, 2020Updated 5 years ago
- The reverse shell client is a Python based alternative for a netcat reverse shell listener☆18Sep 18, 2015Updated 10 years ago
- A Go (golang) Utility package for decoding Active Directory objectSID☆26Nov 26, 2019Updated 6 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- A tool for pulling top-10 cves from cvetrend.com. ;)☆14Aug 4, 2022Updated 3 years ago
- ☆36Sep 28, 2023Updated 2 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Implementation of Data Structures in C☆14Feb 3, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- log-slapper is an open-source offensive security tool designed for red-team operations as the post-exploit module and assessing your Splu…☆24Sep 19, 2024Updated last year
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆39Jan 1, 2022Updated 4 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- The new in-development client for CTFGuide built with Next.js.☆13Feb 11, 2026Updated last month
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- A drop of musical taste from every contributor... Welcome to the developer's collaborative playlist.☆20Sep 19, 2023Updated 2 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- OSCP Methodology☆57Sep 6, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- My note-taking for Professor Messer's CompTIA Security+ SY0-701 certification course as I study for the exam myself.☆50Aug 6, 2024Updated last year
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The c…☆17Mar 30, 2023Updated 2 years ago
- Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134)☆44Jun 6, 2022Updated 3 years ago
- A privacy focused, Chromium browser for web scraping. Built with Tor and PySide6 (a QT framework).☆10Mar 13, 2023Updated 3 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- ☆19Apr 10, 2022Updated 3 years ago
- LDAP Enumeration Tool☆13Mar 28, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- My playbook and Tools used for OSCP Exam☆40Oct 27, 2023Updated 2 years ago
- Slides, documentation, and files from my presentation at Red Team Village for HackerOne's hacktivitycon.☆36Sep 18, 2021Updated 4 years ago
- ☆14Nov 18, 2021Updated 4 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- ☆13Jul 5, 2023Updated 2 years ago
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆13Jul 13, 2023Updated 2 years ago