8L4NK / OSCP-10View external linksLinks
☆24Apr 16, 2019Updated 6 years ago
Alternatives and similar repositories for OSCP-10
Users that are interested in OSCP-10 are comparing it to the libraries listed below
Sorting:
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- ☆14Mar 5, 2021Updated 4 years ago
- A python based semi-automatic buffer overflow exploit script☆16Sep 6, 2020Updated 5 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- A simple C# program to unhook AMSI and execute unmanaged PowerShell.☆19Sep 2, 2021Updated 4 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆23Jan 21, 2024Updated 2 years ago
- pentest scripts☆20Jul 28, 2020Updated 5 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 2 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Aug 14, 2025Updated 6 months ago
- Volatility 3 Plugins☆21Oct 3, 2022Updated 3 years ago
- **SCAM ALERT !!!!!!! ALPHABAY VE DARK WEB TURKİSH DOLANDIRICIDIR BU KONUYU AÇANLARDA KENDİLERİDİR UZAK DURUN** **BÜYÜK BİR DOLANDIRICIL…☆10Jul 14, 2023Updated 2 years ago
- MWDB exercises☆20Jan 21, 2025Updated last year
- A quick reference script that can easily display reverse shells for different languages.☆20May 28, 2020Updated 5 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Oct 4, 2019Updated 6 years ago
- Grap information for multiple IP Addresses including lat/long, city, state, and if the IP is owned by a VPN.☆29Aug 29, 2021Updated 4 years ago
- ☆57May 13, 2020Updated 5 years ago
- Resources for SANS CTI Summit 2021 presentation☆104Nov 8, 2023Updated 2 years ago
- ☆27Mar 5, 2023Updated 2 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Jul 9, 2025Updated 7 months ago
- ☆57Jun 2, 2025Updated 8 months ago
- ☆31Mar 21, 2023Updated 2 years ago
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆33Apr 9, 2024Updated last year
- wordlists for password cracking☆28Aug 15, 2022Updated 3 years ago
- ☆10Feb 5, 2026Updated last week
- This code snippet retrieves Azure Sentinel rules that are mapped to MITRE ATT&CK Framework and generates the related MITRE D3FEND defense…☆74Jun 28, 2021Updated 4 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆37Jul 12, 2023Updated 2 years ago
- Purple Team Security☆76Mar 24, 2022Updated 3 years ago
- Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.☆39Dec 17, 2025Updated last month
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆34Jun 28, 2022Updated 3 years ago
- This is a small script to make the local exploitation process easier. It downloads the precompiled exploit for x86 and x64 architectures …☆31Aug 30, 2017Updated 8 years ago
- How to prepare for OSCP complete guide☆129Oct 20, 2019Updated 6 years ago
- Atomic Purple Team Framework and Lifecycle☆301Feb 11, 2021Updated 5 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Dec 6, 2020Updated 5 years ago
- Repository containing machine solving attempts and results generated by BoxPwnr☆15Updated this week
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆41Oct 25, 2021Updated 4 years ago
- Simple C# Redirector☆93Aug 31, 2025Updated 5 months ago
- A Python based ingestor for BloodHound☆85Sep 26, 2022Updated 3 years ago
- kb=$(cat sillynotes.txt)☆47Jan 23, 2026Updated 3 weeks ago