There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Windows-Privilege-Escalation
Windows Privilege Escalation Techniques and ScriptsHashcat-Cheatsheet
Hashcat Cheatsheet for OSCPVanquish
Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.Hydra-Cheatsheet
Hydra Password Cracking CheetsheetBypassing-Web-Application-Firewalls
A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockersMSF-Venom-Cheatsheet
Single Page Cheatsheet for common MSF Venom One LinersLinux-Privilege-Escalation
Tips and Tricks for Linux Priv EscalationPasswordDecrypts
Handy Stored Password Decryption TechniquesFirmwareReverseEngineering
Notes and tools from my experiences reverse engineering firmwareHackingWithCurl
A list of examples and references of hacking with Bash and the Curl commandWordListGen
Super Simple Python Word List Generator for Fuzzing and Brute Forcing in PythonWindowsShells
Information Repository on Various Methods of getting shell access into a Windows machineBloodHoundCustomQueries
List of Bloodhound Python Custom Queries which I have found to be handy on engagementsPowershell-Cheatsheet
Hand list of Powershell commands frequently used during penetration testsActive-Directory-Fun
Notes on Active Directory analysis and exploitationWindowsMeterpreterSessionDied
Some exploits are unstable in nature and only allow for a very short shell command window. These scripts can help extend your remote shell session by quickly spawning a new reverse shell.SQLMapExamples
A list of sample SQL Map Injection CommandsWordlust
Wordlust is a Password Base Wordlist for Hashcat Mutator RulesPython_DES_Decryptor
A simple python script for decrypting DES that has been generated by a .NET applicationDirectory-Traversal-Toolbox
A few handy scripts for pulling important files off remote machines using a directory traversal or local file include vulnerability.DirtyStringInjectOneLiner
A one liner dirty string with many common injection techniquesCTF-Walkthroughs
A collection of CTF WalkthroughsOpenSSL-Enc-By-Example
Examples of how to use openssl-enc for symmetric cipher encryption and decryptionMouseJacking
MouseJacking on Kali Linux with CrazyRadio PASSH_Sample_Keys
A collection of Public and Private SSH keys for reference purposesSiteMapMaker
Creates an HTML site map based on a specified base URL and a folder path. Handy for exploring for hidden content in Burp Suite if you have the applicationβs source code.MagicPing
Python 2.7 raw socket ICMP ping to send a embedded message or a magic ping to an endpointKaliTroubleshooting
Handy Tricks for Troubleshooting KaliXOR_MOAR
Simple Python Utilities Developed During CTF Events For XORing DataCLISerialFuzzer
Serial Connection CLI Command Jail Break FuzzerVR-Industrial-Control-Room
Virtual Reality experience that transports people into an industrial control room environment.Love Open Source and this site? Check out how you can help us