CHEAT SHEET DE SEGURIDAD PARA ETHICAL HACKING & PENETRATION TESTING
☆33Jan 5, 2017Updated 9 years ago
Alternatives and similar repositories for security-cheatsheets
Users that are interested in security-cheatsheets are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Hunt and Analyze Tor Onion Sites☆24Dec 8, 2022Updated 3 years ago
- I am using these OSINT tools. This list include important domains of OSINT and their respective tools.☆109Jun 22, 2023Updated 2 years ago
- Learn python3 in one picture.☆21Sep 15, 2015Updated 10 years ago
- Misc stuff from internet☆12Nov 5, 2025Updated 4 months ago
- Tool to create large numbers of phantom Bluetooth devices.☆30Apr 1, 2013Updated 12 years ago
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- MBC v2.x expressed in STIX 2.1 JSON☆16Oct 3, 2023Updated 2 years ago
- private online storage for hackers☆16Sep 1, 2013Updated 12 years ago
- Github information gathering☆25Jul 19, 2021Updated 4 years ago
- Search Termux Commands and Guide in Termux !!☆11Apr 29, 2022Updated 3 years ago
- Simple WordList Generator (GUI)☆13Jan 13, 2020Updated 6 years ago
- This is the code bundle of Penetration Testing with Raspberry Pi, Second-Edition book☆10Jan 14, 2021Updated 5 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- GeniSys AI Server is a customisable management system for GeniSys AI networks built on top of Ubuntu 18.04.1 LTS (Bionic Beaver).☆14Jan 6, 2019Updated 7 years ago
- ☆36Dec 28, 2016Updated 9 years ago
- A PowerShell script for Windows security checks, covering Windows Defender, firewall, UAC, updates, BitLocker, network sharing, PowerShel…☆24Aug 2, 2025Updated 7 months ago
- General Scripts to help with various types of SQL Injection☆31Jan 31, 2014Updated 12 years ago
- Screen and touch rotation helper and indicator for GPD Pocket☆29Oct 23, 2018Updated 7 years ago
- cryptam document malware analysis tool☆12Jun 18, 2023Updated 2 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Learning Python Web Penetration Testing, published by Packt☆44Jan 30, 2023Updated 3 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 7 years ago
- Concurrently test bing results for shellshock vulnerability☆42Sep 27, 2014Updated 11 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆23Jan 1, 2023Updated 3 years ago
- ☆17Mar 7, 2019Updated 7 years ago
- Bluetooth PIN and LINK-KEY Cracker☆53May 12, 2014Updated 11 years ago
- A TCP/UDP self-hostable network tunneling solution that supports IPv4 and IPv6☆14Jun 3, 2024Updated last year
- The pentest companion☆15Sep 1, 2021Updated 4 years ago
- Hasherdotid☆11Jul 10, 2018Updated 7 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- ☆26Sep 1, 2017Updated 8 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- Methods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.☆11Apr 2, 2022Updated 3 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- Collection of reusable references☆14Jan 1, 2026Updated 2 months ago