Collected resources for OSWA preparation.
☆26Jan 25, 2023Updated 3 years ago
Alternatives and similar repositories for OSWA-Prep
Users that are interested in OSWA-Prep are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Aug 18, 2023Updated 2 years ago
- ☆33Sep 21, 2024Updated last year
- A collection of useful commands, scripts and resources for the OSWA (WEB-200) exam of Offensive Security☆117Nov 22, 2022Updated 3 years ago
- Optixal's Offensive Security Certified Professional (OSCP) / Penetration Testing with Kali Linux (PWK) Personal Notes☆245Jun 14, 2019Updated 6 years ago
- Preparation for OSWE☆47Apr 19, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Jan 13, 2026Updated 2 months ago
- ☆38Feb 5, 2025Updated last year
- An example repo demonstrating keyless signing with Github Actions☆11May 24, 2022Updated 3 years ago
- Some of my personal notes that helped me pass the OSWP☆60May 15, 2022Updated 3 years ago
- ☆29May 16, 2023Updated 2 years ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆46Oct 29, 2023Updated 2 years ago
- ☆12Apr 20, 2025Updated 11 months ago
- An OSINT tool for discovering domains, organizations, and addresses from SSL/TLS certificates using crt.sh. Supports proxy configurations…☆12Jun 18, 2025Updated 9 months ago
- Bidirectional file transfer via tcp socket in golang(a demo)☆14Oct 13, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- SVG Images with XSS in them☆17Oct 5, 2023Updated 2 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆44Jul 13, 2023Updated 2 years ago
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- Web Hacking and Red Teaming MindMap☆79Dec 24, 2025Updated 3 months ago
- A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.☆13Oct 11, 2020Updated 5 years ago
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Nov 17, 2025Updated 4 months ago
- ☆19Apr 28, 2025Updated 11 months ago
- ☆18Jan 20, 2026Updated 2 months ago
- This script is used to search for cloud certificate entities such as Amazon, Azure, and others that have been extracted by the kaeferjaeg…☆56Nov 21, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆24Jun 25, 2023Updated 2 years ago
- This plant leaf disease detection project was developed using Python, Flask, TensorFlow, and NumPy. The model was trained over 3000+ data…☆12Jul 30, 2023Updated 2 years ago
- ☆21Sep 12, 2022Updated 3 years ago
- Capture WPA/WPA2 4-way handshake using BW16 (RTL8720dn)☆17Feb 22, 2026Updated last month
- A full example report☆11Jul 23, 2019Updated 6 years ago
- A GitHub action to build Stainless SDKs.☆37Apr 2, 2026Updated last week
- Built a deep learning model using tensorflow and keras in python for grape leaf disease detection. Used OpenCV for image processing☆15Oct 14, 2019Updated 6 years ago
- Github action to generate BoM and upload to OWASP dependency track for vulnerability analysis☆52Feb 21, 2026Updated last month
- Hash Kit is tool Programmed by me . It consist of three sections : Encoding Hash , Decoding Hash , and Identifying Hash Id .☆12Dec 5, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆43Jul 31, 2024Updated last year
- ☆12May 11, 2024Updated last year
- ☆16Nov 26, 2024Updated last year
- Responsive Hugo theme inspired in YouTube layout☆11Apr 25, 2023Updated 2 years ago
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆16Jun 2, 2025Updated 10 months ago
- SC-200: Microsoft Security Operations Analyst, by Packt Publishing☆17Jan 30, 2023Updated 3 years ago
- Reddit is tracking every out-going link you click. Even if you are not logged in, every news article, image, or website you visit from R…☆13Aug 6, 2016Updated 9 years ago