Checklists for Testing Security environment
☆899Mar 12, 2025Updated last year
Alternatives and similar repositories for Offensivesecurity-Checklists
Users that are interested in Offensivesecurity-Checklists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆905Mar 17, 2026Updated last month
- OSWE, OSEP, OSED, OSEE☆3,817Jan 2, 2026Updated 4 months ago
- ☆700May 2, 2026Updated last week
- ☆1,719Aug 19, 2022Updated 3 years ago
- ☆244Jan 23, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This repository will contain many mindmaps for cyber security technologies, methodologies, courses, and certifications in a tree structur…☆8,862May 2, 2026Updated last week
- ☆317Jul 6, 2024Updated last year
- Azure and AWS Attacks☆1,119Nov 25, 2022Updated 3 years ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆678Feb 17, 2026Updated 2 months ago
- This repository contain a lot of web and api vulnerability checklist , a lot of vulnerability ideas and tips from twitter☆3,469Feb 10, 2024Updated 2 years ago
- Reports from various areas of information security☆273Apr 13, 2024Updated 2 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,511Mar 14, 2026Updated last month
- Offensive Security OSCP+, OSEP, OSWP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA, OSIR, OSTH Exam and Lab Reporting / Note-Taking Tool☆920Oct 6, 2025Updated 7 months ago
- Scripts and piece of codes used for Active Directory configuration☆83Feb 14, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆760Aug 26, 2022Updated 3 years ago
- SubOwner - A Simple tool check for subdomain takeovers.☆117Oct 18, 2024Updated last year
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Apr 30, 2023Updated 3 years ago
- Mind-Maps of Several Things☆2,650Jun 29, 2023Updated 2 years ago
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆898Dec 28, 2025Updated 4 months ago
- A curated knowledge base to build, run and mature a SOC (including CSIRT).☆1,726Updated this week
- OSCP Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines☆1,086Mar 23, 2026Updated last month
- A collection of snippets of codes and commands to make your life easier!☆2,899Sep 25, 2023Updated 2 years ago
- A comprehensive guide for web application penetration testing and bug bounty hunting, covering methodologies, tools, and resources for id…☆1,806Sep 11, 2025Updated 8 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Tools and Techniques for Red Team / Penetration Testing☆8,719Apr 18, 2026Updated 3 weeks ago
- OSCP Cheat Sheet☆3,724May 6, 2026Updated last week
- i will upload more templates here to share with the comunity.☆569Apr 17, 2024Updated 2 years ago
- A collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just inte…☆921Aug 30, 2023Updated 2 years ago
- ☆76Aug 19, 2021Updated 4 years ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,175Apr 30, 2026Updated last week
- ☆78Apr 25, 2023Updated 3 years ago
- A huge chunk of my personal notes since I started playing CTFs and working as a Red Teamer.☆3,413May 1, 2026Updated last week
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,953Oct 1, 2025Updated 7 months ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆488Oct 7, 2022Updated 3 years ago
- My Notes about Penetration Testing☆734Jan 17, 2026Updated 3 months ago
- This repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand!☆366Aug 17, 2023Updated 2 years ago
- A OWASP Based Checklist With 500+ Test Cases☆888Oct 26, 2022Updated 3 years ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆623Apr 3, 2026Updated last month
- All about bug bounty (bypasses, payloads, and etc)☆6,722Sep 8, 2023Updated 2 years ago
- Red Team Operations Framework☆24Jul 14, 2024Updated last year