Nallium / Peerlyst
A list of collected articles and resources from the website Peerlyst
☆17Updated 7 years ago
Related projects: ⓘ
- ☆26Updated 7 years ago
- ☆24Updated this week
- ☆36Updated this week
- Learn you a book for some infosec good☆62Updated 4 years ago
- Created on 10th August 2017. Purpose of this Project is to note down every useful object I gained during the time I spent working on OSCP…☆19Updated 6 years ago
- Vulnerable web site. Used to test sentinel features.☆10Updated 7 years ago
- ☆52Updated 4 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 5 years ago
- OSCP Scripts☆14Updated 8 years ago
- A curated list of Awesome Threat Intelligence resources☆26Updated 6 years ago
- Penetration Testing/Security Cheatsheets☆55Updated 8 years ago
- This repository contain articles from around the web related to application security. It covers resources for Web , mobile and also nativ…☆12Updated 7 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆57Updated 6 years ago
- Collection of OSCP study material && tools.☆77Updated 5 years ago
- Random collection of exploit code, tools, scripts, etc.☆24Updated 9 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆16Updated 9 years ago
- ☆74Updated this week
- ☆58Updated this week
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆54Updated 6 years ago
- ☆51Updated 5 years ago
- Just a collection of pentest stuffs☆96Updated 4 years ago
- Learnings from OSCP and other random stuff.☆31Updated 6 months ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆65Updated 5 years ago
- ☆20Updated 8 years ago
- ☆34Updated this week
- Collection of best practices to add OSINT into MISP and/or MISP communities☆64Updated 11 months ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆44Updated 2 years ago
- This list of tools is meant to act as a staple resource for Small to Medium businesses. We understand the hardship of not being able to a…☆49Updated 4 years ago
- ☆12Updated this week
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆37Updated 6 years ago