New Framework Red Team Operations
☆20Jun 7, 2021Updated 4 years ago
Alternatives and similar repositories for Cracking-The-Perimeter-Framework
Users that are interested in Cracking-The-Perimeter-Framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆45Oct 19, 2021Updated 4 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- ☆65Jun 5, 2021Updated 4 years ago
- ☆19Jun 16, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- Practice Labs☆104Dec 10, 2020Updated 5 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- eLearnSecurity Certified Exploit Development☆105Jul 25, 2021Updated 4 years ago
- ☆212Mar 4, 2022Updated 4 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- PNPT Exam Preparation - TCM Security☆172Jul 25, 2021Updated 4 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 5 years ago
- ☆158Sep 20, 2021Updated 4 years ago
- ☆16Mar 6, 2019Updated 7 years ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆26Apr 30, 2025Updated 11 months ago
- ☆20May 18, 2022Updated 3 years ago
- ☆19Mar 13, 2022Updated 4 years ago
- ☆74Jan 2, 2025Updated last year
- CTF and Bug Bounty Hunting WriteUps.☆21Feb 20, 2026Updated last month
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Mar 11, 2021Updated 5 years ago
- Hackthebox, Vulnhub, TryHackMe and Real World PenTest☆126Sep 8, 2020Updated 5 years ago
- Windows Security Logging☆43Jul 17, 2022Updated 3 years ago
- Anotações, roadmaps, dicas e guia de pentest.☆11Jan 13, 2022Updated 4 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- ☆757Aug 26, 2022Updated 3 years ago
- A learning and testing environment for web application hacking and pentesting.☆28Jan 2, 2021Updated 5 years ago