CyberSecurityUP / CRPYA
Challenge Python
☆19Updated last year
Related projects ⓘ
Alternatives and complementary repositories for CRPYA
- A simple pentest container equipped with common python pentest tools.☆41Updated last week
- Recon scripts for Red Team and Web blackbox auditing☆29Updated this week
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆24Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- ☆26Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated 11 months ago
- Web Hacking and Red Teaming MindMap☆68Updated last year
- ☆18Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- ☆21Updated 11 months ago
- Tools used for Pentesting☆22Updated last year
- Automate Scoping, OSINT and Recon assessments.☆92Updated 2 months ago
- ☆62Updated last year
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆38Updated last year
- Various AD tools needed for penetration testing in one place.☆21Updated last year
- Powershell tools used for Red Team / Pentesting.☆74Updated 10 months ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆18Updated 4 years ago
- ☆20Updated last year
- ☆24Updated 2 years ago
- Script related in Active Directory Attacks Domain☆21Updated last year
- Red Teaming tools and techniques☆47Updated last year
- ☆76Updated last year
- API fuzzer that exposes security flaws by sending malformed inputs☆14Updated 2 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆24Updated 5 months ago
- This is an AD pentest tools collection☆53Updated 4 months ago
- ☆16Updated 6 months ago
- ☆23Updated 3 months ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆43Updated 8 months ago