New Framework Red Team Operations
☆21Jun 7, 2021Updated 4 years ago
Alternatives and similar repositories for Cracking-The-Perimeter-Framework
Users that are interested in Cracking-The-Perimeter-Framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- ☆45Oct 19, 2021Updated 4 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- ☆11May 30, 2021Updated 4 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆13Nov 4, 2019Updated 6 years ago
- ☆65Jun 5, 2021Updated 4 years ago
- ☆29Aug 12, 2021Updated 4 years ago
- ☆18Jun 16, 2021Updated 4 years ago
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆11Oct 6, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆28Mar 25, 2021Updated 5 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- ☆76Aug 19, 2021Updated 4 years ago
- Practice Labs☆104Dec 10, 2020Updated 5 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- eLearnSecurity Certified Exploit Development☆105Jul 25, 2021Updated 4 years ago
- ☆212Mar 4, 2022Updated 4 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- PNPT Exam Preparation - TCM Security☆172Jul 25, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆24Oct 12, 2021Updated 4 years ago
- Anotações, roadmaps, dicas e guia de pentest.☆12Jan 13, 2022Updated 4 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- Fuxsociety Mr Robot 2.1☆28May 15, 2023Updated 2 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 5 years ago
- ☆112May 30, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆159Sep 20, 2021Updated 4 years ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆26Apr 30, 2025Updated last year
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 6 years ago
- ☆19Mar 13, 2022Updated 4 years ago
- ☆74Jan 2, 2025Updated last year
- CTF and Bug Bounty Hunting WriteUps.☆20Feb 20, 2026Updated 2 months ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 6 years ago