Pentesting notes
☆19Jan 31, 2026Updated last month
Alternatives and similar repositories for Pentesting-notes
Users that are interested in Pentesting-notes are comparing it to the libraries listed below
Sorting:
- ☆14Nov 15, 2020Updated 5 years ago
- ☆11Jun 14, 2022Updated 3 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- Vulnerable Windows 32bit executables for OSCP exam training☆19Dec 12, 2020Updated 5 years ago
- A template for documenting penetration tests with OneNote.☆21Feb 15, 2020Updated 6 years ago
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆56Jan 5, 2026Updated last month
- ☆23Jul 5, 2020Updated 5 years ago
- Advanced Recon Tool☆26Aug 24, 2020Updated 5 years ago
- Tools for passing OSCP☆40Nov 21, 2025Updated 3 months ago
- Active Directory Pentesting Full Course - Red Team Hacking☆29Dec 13, 2021Updated 4 years ago
- ☆32Jun 3, 2019Updated 6 years ago
- Offsec Pentest and Bug Bounty Notes☆24May 28, 2020Updated 5 years ago
- Interactive navi redteam cheats☆34Jul 22, 2025Updated 7 months ago
- A collection of my adventures through hackthebox.eu☆38Apr 25, 2021Updated 4 years ago
- A place to store my various pentesting related code thats too small/niche to justify its own repository, and a simple website with notes …☆40Jan 29, 2026Updated last month
- A tool to detect who's cutting the internet on your network☆13Apr 30, 2020Updated 5 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- Information Security mind map☆15Aug 28, 2021Updated 4 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 9 months ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 2 months ago
- 🔎 Hunt down social media accounts by username across social networks☆11Mar 14, 2020Updated 5 years ago
- Scans the filesystem for directories that are user-writeable☆13Jun 21, 2021Updated 4 years ago
- ☆11Nov 14, 2024Updated last year
- 我的演讲 ppt or pdf 归档库☆10Mar 28, 2021Updated 4 years ago
- ☆13Mar 1, 2024Updated last year
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- External Penetration Testing - Holo Corporate Network - TryHackMe - Holo Network☆10Oct 3, 2021Updated 4 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago
- Autonomous AI-powered security scanner — multi-agent vulnerability detection, exploitation, and validation engine☆35Updated this week
- The tool was created to assist with fuzzing and exploiting stack-based buffer overflows☆10Dec 29, 2020Updated 5 years ago
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- All the latest releases and files for x64dbg...☆13Nov 23, 2020Updated 5 years ago
- Used to grab banners from TCP services and search their contents for a specific string.☆16Feb 11, 2020Updated 6 years ago
- Musings from the brainpan.☆10Jan 8, 2019Updated 7 years ago