ApexPredator-InfoSec / AWAE-OSWELinks
Review of AWAE.OSWE
☆31Updated 3 years ago
Alternatives and similar repositories for AWAE-OSWE
Users that are interested in AWAE-OSWE are comparing it to the libraries listed below
Sorting:
- Repo for OSWE related video content for @SecAura Youtube Channel☆37Updated 3 years ago
- Notes for CRTP☆42Updated 5 years ago
- ☆40Updated 3 years ago
- Becoming the spider, crawling through the webs to catch the fly.☆80Updated 4 years ago
- ☆16Updated 6 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆27Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated last year
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- offensive notes & resources☆43Updated 8 months ago
- Notes Template/Checklist for PEN-300 OSEP☆16Updated 4 years ago
- Vulnerable Windows Application☆18Updated 2 years ago
- NotSoCereal: A Deserialization exploit playground☆54Updated 3 years ago
- ☆27Updated 3 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated last year
- Journey so Far☆31Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- ☆19Updated 3 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆124Updated 4 years ago
- ☆33Updated 4 years ago
- Information Security Information From Web☆28Updated 4 months ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆41Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆42Updated 6 months ago
- A python Flask app that generates dynamic DTDs for easy out-of-band data exfiltration.☆30Updated 3 years ago
- Posts about different topics☆40Updated 4 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- ☆38Updated 4 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago