thatstraw / vim-cheatsheetLinks
☆15Updated 3 years ago
Alternatives and similar repositories for vim-cheatsheet
Users that are interested in vim-cheatsheet are comparing it to the libraries listed below
Sorting:
- ☆29Updated 4 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 3 years ago
- Template used for my OSCP exam.☆29Updated 3 years ago
- ☆18Updated 4 years ago
- ☆21Updated 3 years ago
- A curated list of different pentesting resources☆30Updated 3 years ago
- Script to manage and create local pentesting training virtual lab☆50Updated 5 years ago
- Autorev.sh generates reverse shell codes for reverse shell . Supports linux and windows☆17Updated 3 years ago
- A list of Mind-Map for those interested in getting started in bug bounties.☆17Updated 4 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15Updated 8 months ago
- Notes from OSCP, CTF, security adventures, etc...☆64Updated last year
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- ☆33Updated 4 years ago
- ☆20Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆82Updated 5 years ago
- ☆24Updated 4 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- ☆26Updated 4 years ago
- Android Pentest Setup Environment☆30Updated 3 years ago
- ☆32Updated 4 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Updated 3 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 3 years ago
- ☆24Updated 11 months ago
- King of Bug Bounty Tips Simple Tool☆13Updated 4 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Updated 4 years ago
- ☆23Updated 4 years ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆35Updated 2 years ago
- ☆20Updated 3 years ago
- ☆49Updated 5 years ago