Alekseyyy / hacXivLinks
An arXiv for, what I think, are the finest in hacker works
☆128Updated last year
Alternatives and similar repositories for hacXiv
Users that are interested in hacXiv are comparing it to the libraries listed below
Sorting:
- ☆195Updated last year
- A compact guide to network pivoting for penetration testings / CTF challenges.☆219Updated last year
- This repository contains previous material necessary to opt for the OSEP (Evasion Techniques and Breaching Defenses) certification☆177Updated 4 years ago
- The best resources for learning exploit development☆120Updated 6 years ago
- Practice Labs☆102Updated 5 years ago
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆228Updated 4 years ago
- This repository contains writeups for various CTFs I've participated in (Including Hack The Box).☆156Updated 3 weeks ago
- A curated list of resources for the OSED journey.☆71Updated 3 years ago
- This repository is used to store answers when resolving ctf challanges, how i came to that answer and the line of thought used to reach i…☆90Updated 3 years ago
- Malware development for red teaming workshop☆224Updated 4 years ago
- Scripts featured in the book How to Hack Like a Legend☆148Updated 2 years ago
- List of red team resources☆99Updated 8 years ago
- ☆51Updated 3 years ago
- ☆67Updated 3 years ago
- Example reports from prior years of the Collegiate Penetration Testing Competition☆159Updated 2 months ago
- ☆104Updated 6 years ago
- Active Directory Labs/exams Review☆261Updated 4 years ago
- OSCP Methodology☆52Updated 2 years ago
- Collection of resources for my preparation to take the OSEE certification.☆299Updated 5 years ago
- ☆151Updated 3 weeks ago
- OSCP Cheatsheets☆99Updated 6 years ago
- OSCP notes☆56Updated 4 years ago
- Becoming the spider, crawling through the webs to catch the fly.☆80Updated 4 years ago
- This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.☆122Updated 6 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- ☆65Updated 4 years ago
- ☆63Updated 3 years ago
- Active Directory Cheat Sheet☆143Updated 4 years ago
- 0xpat blog☆108Updated 4 years ago