CyberSecurityUP / eCXD-Preparation
eLearnSecurity Certified Exploit Development
☆103Updated 3 years ago
Alternatives and similar repositories for eCXD-Preparation:
Users that are interested in eCXD-Preparation are comparing it to the libraries listed below
- ☆73Updated 3 years ago
- Practice Labs☆86Updated 4 years ago
- An OSWE Guide☆115Updated 4 years ago
- A OWASP Based Checklist With 80+ Test Cases☆141Updated 2 years ago
- ☆96Updated 3 years ago
- ☆152Updated 3 years ago
- Offensive Security OSWE Prep 2022☆74Updated 2 years ago
- ☆41Updated 3 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆95Updated 2 months ago
- #cheat sheet for OSWP☆85Updated 4 years ago
- OSCP preparation tools, scripts and cheatsheets☆56Updated 2 years ago
- This Repository contains my CRTP cum Red Teaming Active Directory attack and Defence preparation notes.☆41Updated last month
- Hi everyone,☆59Updated last year
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆95Updated 3 years ago
- A collection of lab reports of the Penetration Testing Student course by INE which prepares you for the eJPT.☆46Updated 3 years ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆92Updated 2 months ago
- High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your o…☆98Updated 2 years ago
- ☆65Updated 3 years ago
- Learning resources and external resources to help you prepare for your offsec certifications☆67Updated 4 months ago
- ☆85Updated 2 years ago
- PNPT Exam Preparation - TCM Security☆164Updated 3 years ago
- eLearnSecurity Web application Penetration Tester eXtreme (eWPTXv2)☆24Updated last year
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆197Updated 2 years ago
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆40Updated last week
- ☆209Updated 3 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated 3 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 5 years ago
- ☆118Updated 4 years ago
- ☆62Updated 4 years ago
- ☆77Updated last year