Notes from OSCP, CTF, security adventures, etc...
☆66Feb 6, 2024Updated 2 years ago
Alternatives and similar repositories for pentesting-notes
Users that are interested in pentesting-notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆27Dec 5, 2019Updated 6 years ago
- This is a collection of resources, scripts, bookmarks, writeups, notes, cheatsheets that will help you in OSCP Preparation as well as for…☆227Oct 3, 2020Updated 5 years ago
- Scripts, tools and drivers for wardriving under Mac OSX☆14Dec 7, 2016Updated 9 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆18May 29, 2021Updated 4 years ago
- Offsec Pentest and Bug Bounty Notes☆24May 28, 2020Updated 5 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- OSCP cheatsheet☆107Jan 11, 2024Updated 2 years ago
- My personal bug bounty toolkit.☆164Jun 18, 2024Updated last year
- Pentesting Pratic Notes☆15Oct 30, 2021Updated 4 years ago
- ☆33Sep 7, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 5 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Pentesting notes☆19Jan 31, 2026Updated 2 months ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Apr 15, 2020Updated 6 years ago
- A Python script to parse net blocks & domain names from SPF record☆84Jun 2, 2020Updated 5 years ago
- API research and learning☆12May 22, 2019Updated 6 years ago
- The Cleveridge Subdomain Scanner finds subdomains of a given domain.☆36Mar 1, 2020Updated 6 years ago
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Feb 13, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Transform your pwnagotchi sidekick into a cyber deck rover!☆12Sep 26, 2025Updated 7 months ago
- ☆12Feb 18, 2022Updated 4 years ago
- Resources, Tips, Tricks , Resources, Notes and much more☆21Jan 12, 2023Updated 3 years ago
- New Framework Red Team Operations☆21Jun 7, 2021Updated 4 years ago
- ☆162Dec 7, 2017Updated 8 years ago
- ☆129Jun 15, 2020Updated 5 years ago
- Simple Recon is just a simple bash script to automate my recon process.☆27May 12, 2021Updated 4 years ago
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆109Dec 13, 2022Updated 3 years ago
- Notes Taken for HTB Machines & InfoSec Community.☆377Aug 8, 2022Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- A tool to bruteforce nameservers when working with subdomain delegations to AWS.☆58Aug 22, 2019Updated 6 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- ☆159Mar 23, 2023Updated 3 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago