The focus of this cheat sheet is infrastructure,network penetration testing and web application penetration testing Perform.
☆12Jun 24, 2018Updated 7 years ago
Alternatives and similar repositories for My-Checklist-
Users that are interested in My-Checklist- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automating and Enhancing Nmap using Python☆17Apr 18, 2018Updated 7 years ago
- Penetration Testing Checklist☆37May 14, 2020Updated 5 years ago
- ☆18Dec 8, 2022Updated 3 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- IoT Hacking Kit Details☆19Aug 19, 2025Updated 7 months ago
- A Python script which creates a password list for bruteforce attacks according to the data entered by the user.☆11Mar 28, 2018Updated 7 years ago
- Notes for my CISSP study☆10Aug 5, 2022Updated 3 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- Exploits for different vulnerabilities☆13Nov 29, 2021Updated 4 years ago
- ☆27Jul 29, 2024Updated last year
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- ☆12Apr 26, 2018Updated 7 years ago
- Use yubikey to unlock LUKS partitions in Kali Linux and change LUKS key at every login☆14Nov 16, 2020Updated 5 years ago
- Tactical Race Exploitation & Concurrency Orchestrator☆25Jan 4, 2026Updated 2 months ago
- 🛠️ Ultimate Hardware Hacking Guide | IoT security, embedded systems, UART/SPI analysis, and hardware reverse engineering☆41Jul 24, 2025Updated 8 months ago
- Cloud formation script for solr servers☆17Jul 1, 2015Updated 10 years ago
- buffer-overflow☆15Feb 2, 2022Updated 4 years ago
- Refactored/cleaned up Elegoo's penguin bot☆11Jan 21, 2019Updated 7 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆19Feb 15, 2020Updated 6 years ago
- a JS tool that let you take screenshot of many hosts.☆13Aug 2, 2019Updated 6 years ago
- QUESTER is a Web Pentesting & Bug Bounty Recon tool which queries URLs / Subdomains from the given list of URLs or subdomains.☆15Aug 2, 2021Updated 4 years ago
- Raspberry Pi connect USB RFID Reader model SL500☆16Feb 4, 2018Updated 8 years ago
- A tool to help calculate and explain bandwidth allowances for Droplets on DigitalOcean.☆16Updated this week
- Hacking with the power of checklists.☆39Dec 18, 2018Updated 7 years ago
- A tool to enumerate and exploit SQL Servers in AD☆33Aug 21, 2023Updated 2 years ago
- Do you need to write a ton of CloudFormation? Is it annoying to have to type ParameterKey and ParameterValue a million times and copying …☆21Feb 27, 2017Updated 9 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Jul 26, 2021Updated 4 years ago
- A cyber security toolkit blending manual testing with AI Agents☆111Mar 18, 2026Updated last week
- ☆18Dec 15, 2020Updated 5 years ago
- A JSON API for Nagios☆26Dec 5, 2025Updated 3 months ago
- An animated and fun version of the popular 2048 game. Built with HTML, CSS and Javascript.☆18Oct 10, 2022Updated 3 years ago
- Python Time Based Authentication Attack Tool☆21Apr 20, 2021Updated 4 years ago
- New Harvest in-incubator perfusion system for cellular agriculture and biomedical engineering☆14Oct 23, 2024Updated last year
- This is a fork. Not sure where the original went! -pave Notes for all my Pentesting to help my bad memory :p☆26Dec 11, 2015Updated 10 years ago
- ☆30Jun 27, 2022Updated 3 years ago
- ☆22Oct 31, 2024Updated last year
- Xamarin.iOS bindings for https://github.com/securing/IOSSecuritySuite☆15Aug 18, 2020Updated 5 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆40Dec 29, 2020Updated 5 years ago