Notes for the PJPT exam!
☆14Aug 8, 2024Updated last year
Alternatives and similar repositories for PJPT-Notes
Users that are interested in PJPT-Notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆82Aug 20, 2023Updated 2 years ago
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year
- This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The…☆16Jun 5, 2024Updated last year
- ☆11Oct 11, 2020Updated 5 years ago
- ☆18Jul 9, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Yet another fseventsd parser for macOS forensics☆12Jul 20, 2024Updated last year
- ☆17Jun 21, 2024Updated last year
- Platform for LA CTF. Forked from redpwn/rctf.☆11Feb 6, 2026Updated 2 months ago
- C library for quantum-resistant cryptographic algorithms.☆12Jun 21, 2018Updated 7 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆38Mar 16, 2026Updated 3 weeks ago
- Windows Privilege Escalation☆18Jun 11, 2022Updated 3 years ago
- A repo about CTF challenges that I made at several CTF events☆14Mar 20, 2025Updated last year
- 🍣🐈😺NigiriPad is a nigiri sushi and cat inspired macropad (essentially a mini-keyboard) that can be used with macro shortcuts. NigiriPa…☆16May 30, 2025Updated 10 months ago
- Attack surface discovery and AI-assisted triage for security researchers. Endpoint & parameter mapping with actionable testing hints.☆44Jan 12, 2026Updated 3 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Notes I took to prepare for the CompTIA CySA+ exam (CS1-003 Beta)☆15May 11, 2023Updated 2 years ago
- Little Yellow Chicken CTF Writeups☆17Sep 30, 2025Updated 6 months ago
- MCP server for merging multiple files into one☆25Sep 6, 2025Updated 7 months ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆48Mar 5, 2026Updated last month
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- AD related packs are here!☆16Feb 16, 2023Updated 3 years ago
- gemastik-xvii-final public repository☆23Oct 24, 2024Updated last year
- LA CTF hosted by ACM Cyber & Psi Beta Rho! Website for the largest annual cybersecurity competition at UCLA! Whether you are tackling you…☆13Mar 4, 2026Updated last month
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Automated pentest report writing and generation using DOCX templates and markdown.☆26Apr 1, 2025Updated last year
- A C and Go /proc/pid/maps cloak of invisibilty for shared object files☆21Nov 19, 2025Updated 4 months ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 4 months ago
- A awesome DDoS tool for making attacks to any target☆36Jul 25, 2015Updated 10 years ago
- ☆25Mar 3, 2022Updated 4 years ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- Seamless AI Integration into Caido☆47Updated this week
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆40Jul 28, 2025Updated 8 months ago
- how to get a few pwn points if you don't know how to pwn☆30Jul 6, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A tool that supports finding and abusing whitelisted programs to allow arbitrary file writing into the executable folder of Antivirus sof…☆85Nov 1, 2025Updated 5 months ago
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- Cheatsheet from the PJPT course of TCM security.☆34Jan 15, 2024Updated 2 years ago
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆29Jan 22, 2016Updated 10 years ago
- Reverse engineering CTFs.☆68Jan 25, 2026Updated 2 months ago
- Takeover Account OpenSSH☆42Jun 30, 2024Updated last year