IamKsNoob / PTPv5View external linksLinks
Mindmap/CheatSheet for eLearnSecurity-PTPv5
☆10Jun 18, 2020Updated 5 years ago
Alternatives and similar repositories for PTPv5
Users that are interested in PTPv5 are comparing it to the libraries listed below
Sorting:
- Notes on ECPPT☆24Dec 22, 2018Updated 7 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆64Nov 10, 2019Updated 6 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23May 31, 2020Updated 5 years ago
- Python command line tool used for generating GIAC Certification indexes.☆29Jul 17, 2023Updated 2 years ago
- Undetectable payload for Windows 10 and 11☆39Mar 9, 2023Updated 2 years ago
- ☆14Updated this week
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Penetration Testing Checklist☆37May 14, 2020Updated 5 years ago
- CVE-2021-1732 Microsoft Windows 10 本地提权漏 研究及Poc/Exploit开发☆15Nov 1, 2022Updated 3 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- Raspberry Pi night vision goggle code. python code that creates a side by side stero view (steroscopic) from a single camera☆13May 8, 2021Updated 4 years ago
- Jipsy is a tool which can be used to convert javascript syntax to python syntax (transpiler)☆11Dec 15, 2021Updated 4 years ago
- CTI-URLScan is a command line tool to enable analysts to search URLscan.io submissions. Pull screenshot and DOM content. As well as, auto…☆10Mar 2, 2021Updated 4 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- ☆11Nov 24, 2019Updated 6 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- Simple port scanner in bash for TCP☆10Sep 23, 2024Updated last year
- KCSEC Rubber Ducky Tookit☆11Jul 12, 2018Updated 7 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Updated this week
- The focus of this cheat sheet is infrastructure,network penetration testing and web application penetration testing Perform.☆12Jun 24, 2018Updated 7 years ago
- ☆15Oct 31, 2022Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Dec 11, 2025Updated 2 months ago
- inspec rules for STIGs☆15Dec 4, 2016Updated 9 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆14Jan 9, 2025Updated last year
- Exploits for different vulnerabilities☆13Nov 29, 2021Updated 4 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Docker build of GovReady☆14Nov 14, 2023Updated 2 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- Python3 Scripts for OSCP buffer overflow exploitation☆12May 12, 2021Updated 4 years ago
- Training scenarios for cyber ranges☆14Apr 24, 2020Updated 5 years ago
- A tool to find the memory address of an environment variable in a binary☆11Jun 23, 2015Updated 10 years ago
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 6 years ago
- This tool is used to generate Offensive Security Exploit Developer (OSED) exam report. This is a modified version of https://github.com/n…☆14Jan 19, 2025Updated last year
- Examples of simple code patterns causing BOF☆14Apr 10, 2020Updated 5 years ago
- Open source alternative to Burpsuite☆15May 18, 2021Updated 4 years ago
- CVE-2021-21975 vRealize Operations Manager SSRF☆13Mar 31, 2021Updated 4 years ago