CyberSecurityUP / eCXD-PreparationLinks
eLearnSecurity Certified Exploit Development
☆105Updated 4 years ago
Alternatives and similar repositories for eCXD-Preparation
Users that are interested in eCXD-Preparation are comparing it to the libraries listed below
Sorting:
- ☆75Updated 4 years ago
- ☆101Updated 4 years ago
- Practice Labs☆101Updated 4 years ago
- ☆42Updated 4 years ago
- ☆212Updated 3 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆100Updated 10 months ago
- OSCP preparation tools, scripts and cheatsheets☆59Updated 2 years ago
- High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your o…☆98Updated 3 years ago
- OSCP tools and notes☆40Updated 6 years ago
- ☆27Updated 5 years ago
- ☆65Updated 4 years ago
- ☆20Updated 3 years ago
- You don't need wires to be connected☆41Updated 5 years ago
- A OWASP Based Checklist With 80+ Test Cases☆155Updated 3 years ago
- An OSWE Guide☆117Updated 4 years ago
- Offensive Security OSWE Prep 2022☆75Updated 3 years ago
- An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration…☆149Updated 11 months ago
- ☆64Updated 4 months ago
- ☆27Updated 4 years ago
- ☆32Updated 4 years ago
- #cheat sheet for OSWP☆100Updated 4 years ago
- Scripts created to use with the OSCP exercises☆47Updated 3 years ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆102Updated 4 months ago
- ☆78Updated 2 years ago
- ☆88Updated 3 years ago
- ☆45Updated 4 years ago
- Script to manage and create local pentesting training virtual lab☆49Updated 5 years ago
- I used the Templater community plugin in obsidian to automatically populate IP,username,password☆43Updated 2 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆23Updated 2 weeks ago