CsEnox / Art-of-Creating-MachinesLinks
☆61Updated 3 years ago
Alternatives and similar repositories for Art-of-Creating-Machines
Users that are interested in Art-of-Creating-Machines are comparing it to the libraries listed below
Sorting:
- Active Directory Labs/exams Review☆259Updated 4 years ago
- Becoming the spider, crawling through the webs to catch the fly.☆76Updated 4 years ago
- Simple HTTP listener for security testing☆116Updated 9 months ago
- This repository contains previous material necessary to opt for the OSEP (Evasion Techniques and Breaching Defenses) certification☆170Updated 4 years ago
- OSCP notes☆55Updated 4 years ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆211Updated last year
- ☆66Updated 3 years ago
- Chat.JS - Vulnerable NodeJS Web-App to practice NoSQLi and Deserialization exploitation☆28Updated 4 years ago
- High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your o…☆97Updated 3 years ago
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.☆48Updated last year
- An OSWE Guide☆116Updated 4 years ago
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆220Updated 2 years ago
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆110Updated 4 years ago
- ☆64Updated 4 years ago
- ☆48Updated last year
- Notes compiled for the OSCP exam.☆155Updated 3 years ago
- Offensive Security OSWE Prep 2022☆74Updated 2 years ago
- Practice Labs☆96Updated 4 years ago
- ☆131Updated 4 years ago
- TUDO - A vulnerable PHP Web Application☆121Updated 2 years ago
- Personal notes used to pass the OSWP exam☆86Updated 3 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 3 years ago
- generate payloads that force authentication against an attacker machine☆109Updated 2 years ago
- ☆82Updated 5 years ago
- ☆29Updated 4 years ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆61Updated 2 years ago
- Damn Vulnerable Thick Client App developed in C# .NET☆156Updated 2 years ago
- SSTI Payload Generator☆91Updated 3 years ago
- ☆161Updated 3 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago