ApexPredator-InfoSec / AWAE-OSWELinks
Review of AWAE.OSWE
☆31Updated 3 years ago
Alternatives and similar repositories for AWAE-OSWE
Users that are interested in AWAE-OSWE are comparing it to the libraries listed below
Sorting:
- Notes for CRTP☆41Updated 4 years ago
- Repo for OSWE related video content for @SecAura Youtube Channel☆35Updated 3 years ago
- ☆38Updated 3 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆39Updated 2 years ago
- Becoming the spider, crawling through the webs to catch the fly.☆76Updated 4 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- ☆16Updated 6 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆20Updated last year
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- Information Security Information From Web☆27Updated this week
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Template used for my OSCP exam.☆29Updated 2 years ago
- NotSoCereal: A Deserialization exploit playground☆53Updated 3 years ago
- ☆26Updated 3 years ago
- Notes on Preparing for Offsec☆25Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- Vulnerable Windows Application☆17Updated last year
- ☆16Updated 3 years ago
- ☆14Updated 4 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆37Updated 3 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- ☆27Updated 2 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆110Updated 3 years ago
- ☆20Updated 3 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆92Updated 2 years ago
- ☆131Updated 4 years ago