A PlayBook for OSWP & Wireless Pentest
☆49Jul 28, 2024Updated last year
Alternatives and similar repositories for OSWP-PlayBook
Users that are interested in OSWP-PlayBook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Apr 20, 2025Updated 11 months ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆46Oct 29, 2023Updated 2 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- Training and certifications related to secure software development☆10Feb 9, 2026Updated 2 months ago
- Every GitHub repo mentioning OSCP — hunted, cloned, read by AI, judged by a human. 399 clean repos.☆78Mar 5, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12Mar 9, 2026Updated last month
- A compilation of important commands, files, and tools used in Pentesting☆55Jan 17, 2023Updated 3 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆33Sep 19, 2023Updated 2 years ago
- Sigma Queries turned into KQL for Defender using pysigma☆12Mar 29, 2026Updated 2 weeks ago
- PKIX certificates management for Erlang☆12Jun 27, 2024Updated last year
- ☆43Mar 13, 2023Updated 3 years ago
- Offensive Security OSWE Prep 2022☆76Sep 10, 2022Updated 3 years ago
- An Infrastructure as code proof of concept to deploy a bare minimum AD environment in AWS.☆47Sep 18, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Create Kali Linux VM with i3 using Vagrant and Ansible☆16Feb 18, 2020Updated 6 years ago
- ☆16Aug 2, 2025Updated 8 months ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- ☆14Mar 8, 2023Updated 3 years ago
- CSF Firewall and AbuseIPDB API integration with specific focus on data privacy and prevention of sensitive data leaked to public AbuseIPD…☆16Mar 20, 2024Updated 2 years ago
- ☆12Apr 8, 2022Updated 4 years ago
- ☆10Oct 8, 2018Updated 7 years ago
- ☆12May 9, 2017Updated 8 years ago
- ☆11Aug 18, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆36Nov 5, 2024Updated last year
- ☆24Jan 27, 2026Updated 2 months ago
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- Basic interactive Windows kernel offensive toolkit written in C☆136Sep 20, 2025Updated 6 months ago
- Defending against malicious USB firmware in the Linux kernel☆17Mar 8, 2016Updated 10 years ago
- ☆12Jul 14, 2025Updated 9 months ago
- A centralized list of the various Potato Windows exploits.☆22Mar 31, 2026Updated 2 weeks ago
- Extract metadata with SSRF (Server-Side Request Forgery)☆16Jul 23, 2022Updated 3 years ago
- SVG Images with XSS in them☆17Oct 5, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆10Jul 1, 2023Updated 2 years ago
- ☆23Mar 17, 2024Updated 2 years ago
- PAYGoat is a banking application built for educational purposes, focused on exploring and understanding common business logic flaws in fi…☆190Mar 11, 2026Updated last month
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆13Jan 19, 2024Updated 2 years ago
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆16Oct 13, 2022Updated 3 years ago
- Preparation of Attack & Defense CTF for iHack 2022☆16Nov 28, 2023Updated 2 years ago
- ☆15Jul 28, 2024Updated last year