☆15Apr 4, 2022Updated 3 years ago
Alternatives and similar repositories for vim-cheatsheet
Users that are interested in vim-cheatsheet are comparing it to the libraries listed below
Sorting:
- ☆21Mar 12, 2022Updated 4 years ago
- Cron is best for scheduling repetitive tasks. Cron is a utility tool that allows users to enter commands for repeating actions at a give…☆23Aug 2, 2022Updated 3 years ago
- ☆18May 31, 2023Updated 2 years ago
- OSCP Privilege Escalation MindMap/Guide☆199Apr 4, 2022Updated 3 years ago
- Under Construction | Shell Scripting HandBook☆10May 19, 2024Updated last year
- ☆17Oct 16, 2020Updated 5 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- ☆10May 12, 2017Updated 8 years ago
- check if the source code compressed and uploaded to the server by mistake☆10Feb 21, 2022Updated 4 years ago
- Puppet Guide☆11Jan 2, 2022Updated 4 years ago
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 5 years ago
- ☆24Feb 7, 2025Updated last year
- Zabbix - SAML SSO Authentication Bypass☆15Mar 31, 2022Updated 3 years ago
- Learn DevOps Helm/Helmfile Kubernetes deployment☆11May 13, 2020Updated 5 years ago
- ☆10Jan 25, 2023Updated 3 years ago
- 📈DevStats deployment on Kubernetes using Equinix servers and Helm, CoreDNS, containerd, MetalLB, OpenEBS, nginx-ingress, nginx, cert-man…☆16Updated this week
- re-hosted web identiy course from opensecuritytraining.info☆11Nov 7, 2025Updated 4 months ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- instructions to get serveo (local copy) running on your local system.☆12Aug 27, 2021Updated 4 years ago
- ☆15Jan 4, 2022Updated 4 years ago
- A Nagios-compatible monitoring agent☆14Mar 13, 2026Updated last week
- 🎉 Happy 4th anniversary to the ResetHacker community! 🎉☆11Aug 8, 2024Updated last year
- 🎯 SQL Injection Payload List☆10Jun 6, 2021Updated 4 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- collect robots.txt endpoint for allowed and disallowed endpoints from a list of subdomains☆14Jan 23, 2023Updated 3 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- Common Bugs from low to critical Level☆16May 9, 2021Updated 4 years ago
- Pentest-Command☆20Nov 10, 2021Updated 4 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- ☆29Jan 15, 2017Updated 9 years ago
- Tool to extract all subdomains from crt.sh search using RegEx and Web Scraping☆21Jan 5, 2024Updated 2 years ago
- All included tools on Kaisen Linux☆17Aug 12, 2025Updated 7 months ago
- A Repository which contains python scripts to automate things and make your life easier with python.☆12Apr 25, 2022Updated 3 years ago
- ☆24Mar 21, 2023Updated 3 years ago
- Seamless mode integration for WSL☆11Dec 29, 2023Updated 2 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- ☆14Jun 30, 2022Updated 3 years ago
- Build a cloud-init enabled Ubuntu VM template on Proxmox☆19Feb 1, 2023Updated 3 years ago
- ☆22Mar 18, 2024Updated 2 years ago