There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Windows-Privilege-Escalation
Windows Privilege Escalation Techniques and ScriptsHashcat-Cheatsheet
Hashcat Cheatsheet for OSCPVanquish
Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.Hydra-Cheatsheet
Hydra Password Cracking CheetsheetBypassing-Web-Application-Firewalls
A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockersMSF-Venom-Cheatsheet
Single Page Cheatsheet for common MSF Venom One LinersLinux-Privilege-Escalation
Tips and Tricks for Linux Priv EscalationPasswordDecrypts
Handy Stored Password Decryption TechniquesFirmwareReverseEngineering
Notes and tools from my experiences reverse engineering firmwareHackingWithCurl
A list of examples and references of hacking with Bash and the Curl commandWindowsShells
Information Repository on Various Methods of getting shell access into a Windows machineBloodHoundCustomQueries
List of Bloodhound Python Custom Queries which I have found to be handy on engagementsPowershell-Cheatsheet
Hand list of Powershell commands frequently used during penetration testsActive-Directory-Fun
Notes on Active Directory analysis and exploitationWindowsMeterpreterSessionDied
Some exploits are unstable in nature and only allow for a very short shell command window. These scripts can help extend your remote shell session by quickly spawning a new reverse shell.SQLMapExamples
A list of sample SQL Map Injection CommandsWordlust
Wordlust is a Password Base Wordlist for Hashcat Mutator RulesPython_DES_Decryptor
A simple python script for decrypting DES that has been generated by a .NET applicationDirectory-Traversal-Toolbox
A few handy scripts for pulling important files off remote machines using a directory traversal or local file include vulnerability.DirtyStringInjectOneLiner
A one liner dirty string with many common injection techniquesCTF-Walkthroughs
A collection of CTF WalkthroughsOpenSSL-Enc-By-Example
Examples of how to use openssl-enc for symmetric cipher encryption and decryptionMouseJacking
MouseJacking on Kali Linux with CrazyRadio PASSH_Sample_Keys
A collection of Public and Private SSH keys for reference purposesSiteMapMaker
Creates an HTML site map based on a specified base URL and a folder path. Handy for exploring for hidden content in Burp Suite if you have the applicationโs source code.MagicPing
Python 2.7 raw socket ICMP ping to send a embedded message or a magic ping to an endpointKaliTroubleshooting
Handy Tricks for Troubleshooting KaliXOR_MOAR
Simple Python Utilities Developed During CTF Events For XORing Datac2
C2CLISerialFuzzer
Serial Connection CLI Command Jail Break FuzzerVR-Industrial-Control-Room
Virtual Reality experience that transports people into an industrial control room environment.Love Open Source and this site? Check out how you can help us