Notes for the PJPT exam!
☆14Aug 8, 2024Updated last year
Alternatives and similar repositories for PJPT-Notes
Users that are interested in PJPT-Notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆81Aug 20, 2023Updated 2 years ago
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year
- This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The…☆16Jun 5, 2024Updated last year
- ☆11Oct 11, 2020Updated 5 years ago
- Platform for LA CTF. Forked from redpwn/rctf.☆11Feb 6, 2026Updated last month
- ☆18Jul 9, 2020Updated 5 years ago
- Yet another fseventsd parser for macOS forensics☆12Jul 20, 2024Updated last year
- ☆17Jun 21, 2024Updated last year
- C library for quantum-resistant cryptographic algorithms.☆12Jun 21, 2018Updated 7 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆37Mar 16, 2026Updated last week
- Windows Privilege Escalation☆18Jun 11, 2022Updated 3 years ago
- A repo about CTF challenges that I made at several CTF events☆14Mar 20, 2025Updated last year
- 🍣🐈😺NigiriPad is a nigiri sushi and cat inspired macropad (essentially a mini-keyboard) that can be used with macro shortcuts. NigiriPa…☆16May 30, 2025Updated 9 months ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆45Mar 5, 2026Updated 2 weeks ago
- Notes I took to prepare for the CompTIA CySA+ exam (CS1-003 Beta)☆15May 11, 2023Updated 2 years ago
- Attack surface discovery and AI-assisted triage for security researchers. Endpoint & parameter mapping with actionable testing hints.☆43Jan 12, 2026Updated 2 months ago
- Little Yellow Chicken CTF Writeups☆17Sep 30, 2025Updated 5 months ago
- MCP server for merging multiple files into one☆25Sep 6, 2025Updated 6 months ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- AD related packs are here!☆16Feb 16, 2023Updated 3 years ago
- gemastik-xvii-final public repository☆23Oct 24, 2024Updated last year
- LA CTF hosted by ACM Cyber & Psi Beta Rho! Website for the largest annual cybersecurity competition at UCLA! Whether you are tackling you…☆13Mar 4, 2026Updated 2 weeks ago
- Automated pentest report writing and generation using DOCX templates and markdown.☆25Apr 1, 2025Updated 11 months ago
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- Seamless AI Integration into Caido☆45Updated this week
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 3 months ago
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆39Jul 28, 2025Updated 7 months ago
- A awesome DDoS tool for making attacks to any target☆36Jul 25, 2015Updated 10 years ago
- ☆26Mar 3, 2022Updated 4 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- how to get a few pwn points if you don't know how to pwn☆30Jul 6, 2019Updated 6 years ago
- A tool that supports finding and abusing whitelisted programs to allow arbitrary file writing into the executable folder of Antivirus sof…☆82Nov 1, 2025Updated 4 months ago
- Welcome to API Learning 101! This repository is your comprehensive guide to understanding and working with APIs, complete with a fully fu…☆54Jan 29, 2026Updated last month
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆13Jul 13, 2023Updated 2 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Cheatsheet from the PJPT course of TCM security.☆33Jan 15, 2024Updated 2 years ago
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago