This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.
☆82Aug 20, 2023Updated 2 years ago
Alternatives and similar repositories for PJPT_CheatSheet
Users that are interested in PJPT_CheatSheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cheatsheet from the PJPT course of TCM security.☆34Jan 15, 2024Updated 2 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- My notes while studying for the PNPT from TCM Security.☆100Apr 24, 2024Updated last year
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆12Nov 23, 2023Updated 2 years ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆151Mar 20, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- post/windows/manage/enable_rdp Metaploit module in Command prompt module☆37Apr 21, 2019Updated 6 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year
- All cheetsheets with main information from HTB CBBH role path in one place.☆117Mar 20, 2024Updated 2 years ago
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆24Jun 25, 2023Updated 2 years ago
- ☆11Dec 17, 2023Updated 2 years ago
- ☆13Mar 7, 2025Updated last year
- ☆31Mar 20, 2026Updated last week
- ☆37Jun 29, 2022Updated 3 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆28Mar 8, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- PNPT Exam Preparation - TCM Security☆172Jul 25, 2021Updated 4 years ago
- This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The…☆16Jun 5, 2024Updated last year
- Testing POC for use cases☆25Nov 24, 2024Updated last year
- ☆11Oct 11, 2020Updated 5 years ago
- Platform for LA CTF. Forked from redpwn/rctf.☆11Feb 6, 2026Updated last month
- Notes in preparation for the PNPT (Practical Network Penetration Testing) Certification Exam☆62Apr 30, 2023Updated 2 years ago
- Multithread reverse shell listener☆26Feb 10, 2024Updated 2 years ago
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆41Jan 23, 2026Updated 2 months ago
- Keycloak admin API allows low privilege users to use administrative functions☆28Oct 12, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- Web recon script. No need to fear, sumrecon is here!☆398Oct 10, 2022Updated 3 years ago
- An intentionally vulnerable web application for learning penetration testing techniques.☆31Feb 2, 2026Updated last month
- A collection of my reverse engineering and malware analysis write-ups☆21Dec 11, 2020Updated 5 years ago
- ☆242Aug 31, 2021Updated 4 years ago
- CLI tool for fetching URLs from Wayback Machine, Common Crawl, and VirusTotal.☆40Aug 21, 2025Updated 7 months ago
- Collected resources for OSWA preparation.☆26Jan 25, 2023Updated 3 years ago
- Yet another fseventsd parser for macOS forensics☆12Jul 20, 2024Updated last year
- bash script for automating subdomain enumeration process either passive or active☆29Feb 24, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- DLink DIR-846 Authenticated Remote Code Execution☆18Oct 4, 2023Updated 2 years ago
- Sample pentest report provided by TCM Security☆1,344Mar 18, 2022Updated 4 years ago
- tricks I discovered while playing king of the hill☆17Jun 28, 2023Updated 2 years ago
- OSCP Preparation☆93Jul 16, 2023Updated 2 years ago
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆37Mar 16, 2026Updated 2 weeks ago