☆12Aug 22, 2017Updated 8 years ago
Alternatives and similar repositories for pwk-cheatsheet
Users that are interested in pwk-cheatsheet are comparing it to the libraries listed below
Sorting:
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- The ultimate phishing tool with 38 websites available!☆16Nov 7, 2024Updated last year
- Powershell script to build active directory forest and populate AD with random AD objects including AD users objects, computers objects, …☆39Jan 1, 2022Updated 4 years ago
- My playbook and Tools used for OSCP Exam☆39Oct 27, 2023Updated 2 years ago
- The new in-development client for CTFGuide built with Next.js.☆13Feb 11, 2026Updated 3 weeks ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- ☆12Jul 5, 2023Updated 2 years ago
- A web crawler in PHP☆12Aug 16, 2018Updated 7 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 3 months ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- OSCP Methodology☆57Sep 6, 2023Updated 2 years ago
- A user-friendly app for tracking business expenses and revenue, designed to simplify financial management for entrepreneurs and small bus…☆13Dec 8, 2024Updated last year
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- Kali Linux Cheat Sheet☆14Jan 23, 2023Updated 3 years ago
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆14Jun 11, 2025Updated 8 months ago
- This repository houses diverse files and challenges centered around Just Mobile Security. With practical exercises and resources aimed at…☆13Apr 15, 2024Updated last year
- Daily C2 threat intelligence feed☆19Updated this week
- LDAP Enumeration Tool☆13Mar 28, 2024Updated last year
- A tool to combine a PDF and a JPG into one polyglot file which is both a PDF and JPG☆16Dec 8, 2019Updated 6 years ago
- Forensics Science Education☆11Apr 26, 2021Updated 4 years ago
- The files for my Solder Sustainer v2 project! Check it out at www.roboticworx.io!☆14Jan 8, 2025Updated last year
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- A privacy focused, Chromium browser for web scraping. Built with Tor and PySide6 (a QT framework).☆10Mar 13, 2023Updated 2 years ago
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated 2 months ago
- List of android RATs☆13Jan 2, 2021Updated 5 years ago
- Some scripts useful for red team activities☆13Jan 18, 2020Updated 6 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆20May 22, 2025Updated 9 months ago
- Helper script for identifying bad characters based on (Immunity|edb)'s stack dump☆13Mar 18, 2023Updated 2 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- An online review webscraper that adapts to various HTML topologies☆11Jul 22, 2024Updated last year
- ☆14Nov 18, 2021Updated 4 years ago
- Implementation of Data Structures in C☆14Feb 3, 2021Updated 5 years ago
- A tool for pulling top-10 cves from cvetrend.com. ;)☆14Aug 4, 2022Updated 3 years ago