CaptBoykin / oscp
Scripts and things that I have created when I was doing OSCP.
☆43Updated 5 years ago
Alternatives and similar repositories for oscp:
Users that are interested in oscp are comparing it to the libraries listed below
- Scripts created to use with the OSCP exercises☆46Updated 2 years ago
- A collection of resources I'm using while working toward the OSCP☆77Updated 2 years ago
- ☆99Updated 4 years ago
- Opening the door, one reverse shell at a time☆182Updated 3 years ago
- My OSCP journey☆158Updated 2 years ago
- Optixal's Offensive Security Certified Professional (OSCP) / Penetration Testing with Kali Linux (PWK) Personal Notes☆216Updated 5 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆59Updated 5 years ago
- ☆73Updated 3 years ago
- ☆76Updated 3 years ago
- list of useful commands, shells and notes related to OSCP☆76Updated 6 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆62Updated 5 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆41Updated 4 years ago
- ☆21Updated 2 years ago
- ☆24Updated 4 years ago
- Markdown reporting templates and Pandoc styling references to generate sleek reports for OSCP/PWK with little effort.☆199Updated 3 years ago
- Notes on ECPPT☆22Updated 6 years ago
- ☆29Updated 5 years ago
- ☆81Updated 4 years ago
- OSCP tools and notes☆41Updated 5 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆63Updated 3 years ago
- ☆65Updated 2 years ago
- eLearnSecurity Certified Exploit Development☆100Updated 3 years ago
- OSCP ( Offensive Security Certified Professional )☆181Updated 3 years ago
- ☆62Updated 4 years ago
- ☆28Updated 4 years ago
- OSCP preperation and HackTheBox write ups.☆55Updated last year
- OSCP preparation tools, scripts and cheatsheets☆56Updated 2 years ago
- Offensive Security Web Assessor Resources Repo☆22Updated last year
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 5 years ago