Tib3rius / Kali-ConfigsLinks
☆30Updated 3 years ago
Alternatives and similar repositories for Kali-Configs
Users that are interested in Kali-Configs are comparing it to the libraries listed below
Sorting:
- Burp Suite Certified Practitioner Exam Study☆18Updated 2 years ago
- OWASP based Web Application Security Testing Checklist☆74Updated 11 months ago
- ☆66Updated 3 years ago
- OSCP preperation and HackTheBox write ups.☆60Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆74Updated 2 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆39Updated 2 years ago
- ☆75Updated 3 years ago
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆90Updated 3 months ago
- ☆58Updated this week
- Red Teaming tools and techniques☆53Updated 2 years ago
- OSCP preparation tools, scripts and cheatsheets☆57Updated 2 years ago
- ☆68Updated 2 years ago
- Some handy bash scripts I used for the OSCP☆23Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated 11 months ago
- Template used for my OSCP exam.☆29Updated 2 years ago
- Unofficial list of approved tools for OSCP☆16Updated 2 years ago
- ☆65Updated 2 years ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆28Updated last year
- ☆29Updated 5 years ago
- Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and h…☆92Updated 3 weeks ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆98Updated this week
- ☆21Updated last month
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆65Updated 5 months ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- ☆44Updated 3 years ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆167Updated last year
- I used the Templater community plugin in obsidian to automatically populate IP,username,password☆42Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated this week
- eLearnSecurity Certified Exploit Development☆104Updated 3 years ago