☆25Jan 11, 2023Updated 3 years ago
Alternatives and similar repositories for offensive-security-practices-cheatsheet
Users that are interested in offensive-security-practices-cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A compilation of important commands, files, and tools used in Pentesting☆55Jan 17, 2023Updated 3 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- ☆24Feb 7, 2025Updated last year
- ☆52Oct 10, 2025Updated 5 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Web Hacking and Red Teaming MindMap☆78Dec 24, 2025Updated 3 months ago
- ☆22Jul 15, 2023Updated 2 years ago
- offensive security scripts and documentation☆30Mar 9, 2026Updated 2 weeks ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36May 27, 2023Updated 2 years ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- Bash script to manage insecure web apps using docker and hosts aliases for pentest practice☆38Jan 3, 2026Updated 2 months ago
- My Favorite Offensive Security Scripts☆88Apr 25, 2025Updated 11 months ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- ☆28Mar 31, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Jan 14, 2024Updated 2 years ago
- The most average C2 ever (MACE)☆97Apr 9, 2022Updated 3 years ago
- Windows And Ways To Break It☆100Jan 28, 2026Updated 2 months ago
- Simple Python script to sort nuclei scans by severity and URL☆29May 24, 2023Updated 2 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- ☆29May 16, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆19Mar 4, 2023Updated 3 years ago
- ☆12Apr 20, 2025Updated 11 months ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 2 months ago
- Offensive Security OSWE Prep 2022☆76Sep 10, 2022Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- A utility to fetch and display dns names from the SSL/TLS cert data☆16Aug 11, 2023Updated 2 years ago
- Some scripts and reports to expand your dbachecks experience☆12Mar 13, 2023Updated 3 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆44Jul 13, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Sep 8, 2021Updated 4 years ago
- Templated Obfuscation example in C++ for protecting/hiding values in memory☆40Feb 1, 2025Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Feb 15, 2022Updated 4 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- OSCP Study Guide☆41Oct 10, 2022Updated 3 years ago
- Azure DevOps is an end-to-end software development platform.☆13Aug 25, 2025Updated 7 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Nov 29, 2023Updated 2 years ago