☆25Jan 11, 2023Updated 3 years ago
Alternatives and similar repositories for offensive-security-practices-cheatsheet
Users that are interested in offensive-security-practices-cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A compilation of important commands, files, and tools used in Pentesting☆56Jan 17, 2023Updated 3 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 4 months ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- ☆24Feb 7, 2025Updated last year
- ☆52Oct 10, 2025Updated 6 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Web Hacking and Red Teaming MindMap☆79Dec 24, 2025Updated 4 months ago
- ☆22Jul 15, 2023Updated 2 years ago
- offensive security scripts and documentation☆30Mar 9, 2026Updated 2 months ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36May 27, 2023Updated 2 years ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- My Favorite Offensive Security Scripts☆89Apr 25, 2025Updated last year
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆38Jan 3, 2026Updated 4 months ago
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆28Mar 31, 2023Updated 3 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Jan 14, 2024Updated 2 years ago
- Windows And Ways To Break It☆100Jan 28, 2026Updated 3 months ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- The most average C2 ever (MACE)☆99Apr 9, 2022Updated 4 years ago
- Describe how to use ffuf different options with examples☆14Jun 13, 2022Updated 3 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 3 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆12Feb 3, 2026Updated 3 months ago
- Zeek Profinet I/O Context Manager Parser - CISA ICSNPP☆14Nov 19, 2025Updated 5 months ago
- ☆29May 16, 2023Updated 2 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- ☆12Apr 20, 2025Updated last year
- All binaries, tools,wordlists and tutorials you need to pass eCPPTv2 - For Free!☆26Jan 28, 2023Updated 3 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 3 months ago
- Offensive Security OSWE Prep 2022☆78Sep 10, 2022Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- Some scripts and reports to expand your dbachecks experience☆12Mar 13, 2023Updated 3 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆44Jul 13, 2023Updated 2 years ago
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Sep 8, 2021Updated 4 years ago
- Templated Obfuscation example in C++ for protecting/hiding values in memory☆40Feb 1, 2025Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Feb 15, 2022Updated 4 years ago