Unofficial list of approved tools for OSCP
☆27Apr 25, 2023Updated 2 years ago
Alternatives and similar repositories for Cheat-Sheets
Users that are interested in Cheat-Sheets are comparing it to the libraries listed below
Sorting:
- Password Lists for penetration testing, sorted by language.☆13Nov 23, 2017Updated 8 years ago
- This script provides a Python library with methods to authenticate to various sources of threat intelligence and query IPs for the latest…☆18Feb 16, 2025Updated last year
- Python program to exploit stack-based buffer overflows.☆22Feb 24, 2021Updated 5 years ago
- ☆34Sep 28, 2023Updated 2 years ago
- Minimal web server enumeration & attack surface detection tool based on results of nmap.☆38Sep 24, 2024Updated last year
- This is a small script to make the local exploitation process easier. It downloads the precompiled exploit for x86 and x64 architectures …☆31Aug 30, 2017Updated 8 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 4 years ago
- A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.☆10Jan 1, 2025Updated last year
- Raspberry Pi powered Digital Clock for Amateur Radio using TM1637 4 digit displays☆11Mar 20, 2021Updated 4 years ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 3 months ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Bulk scanning of Hosts and IPs using the Shodan API☆10Apr 26, 2022Updated 3 years ago
- A python steganography module to store messages or files protected with AES-256 encryption inside an image.☆10Jan 18, 2022Updated 4 years ago
- ☆10Aug 24, 2024Updated last year
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Jan 16, 2021Updated 5 years ago
- Wrapper script for letsencrypt☆11May 27, 2020Updated 5 years ago
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- Blogs, Tools and other available resources for source code review.☆10Nov 18, 2021Updated 4 years ago
- virustotal API-based project for checking the list of hashes against virustotal.com database☆11Feb 26, 2018Updated 8 years ago
- CISSP Books Free Download☆21Jul 27, 2024Updated last year
- ☆13Nov 12, 2024Updated last year
- PSX provides a collection of common operations that rely on PowerShell like encoding and hosting PowerShell-specific payloads☆12Oct 18, 2023Updated 2 years ago
- Lockstitch is an incremental, stateful cryptographic primitive for symmetric-key cryptographic operations (e.g. hashing, encryption, mess…☆12Feb 5, 2026Updated last month
- urlscan.io API wrapper for Ruby☆13Oct 16, 2023Updated 2 years ago
- This was made with the intention of providing evidence of work done towards furthering education in cyber security.☆10May 12, 2022Updated 3 years ago
- Big Dorker☆14Oct 18, 2024Updated last year
- The Zonemaster GUI - part of the Zonemaster project☆17Updated this week
- ☆12Oct 10, 2024Updated last year
- Linpeas optimization tool☆13Feb 3, 2022Updated 4 years ago
- The method and files used to generate Sysmon event logs, push them to a remote Splunk, and ingest/normalize the data for analysis.☆10Sep 28, 2020Updated 5 years ago
- Utility to attempt to find the passphrase of a GPG secret key☆10May 23, 2024Updated last year
- Dump Microsoft Portable Executable (PE) Files Information☆15Dec 13, 2025Updated 2 months ago
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆12Apr 3, 2023Updated 2 years ago