absolomb / PentestingLinks
Pentesting Cheatsheets and Guides
☆122Updated 7 years ago
Alternatives and similar repositories for Pentesting
Users that are interested in Pentesting are comparing it to the libraries listed below
Sorting:
- ☆154Updated 7 years ago
- Custom checklists, cheatsheets, links, and scripts☆126Updated 5 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Offensive Security / Pentesting Cheat Sheets☆100Updated 6 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Learnings from OSCP and other random stuff.☆31Updated last year
- Penetration Testing Playbook (PTP)☆175Updated 6 years ago
- How to prepare for OSCP complete guide☆128Updated 5 years ago
- Linux Local Enumeration Script☆79Updated 4 years ago
- A Linux enumeration script for Hack The Box☆190Updated 5 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- …(⊙_⊙;)…☆56Updated 4 years ago
- ☆94Updated 7 years ago
- Resource for developing infosec skills for OSCP☆115Updated last year
- Python template to assist with buffer overflows☆71Updated 5 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆97Updated this week
- oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or …☆67Updated 6 years ago
- Collection of different exploits☆182Updated 4 years ago
- ☆44Updated 10 months ago
- Custom Tools and Notes from my own Penetration Testing Experience☆277Updated last year
- 👹☆56Updated 3 years ago
- ☆136Updated 8 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- Custom tools and projects about security☆110Updated 4 years ago
- Simple script to generate commands to achieve reverse shells.☆119Updated 4 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆89Updated 8 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆18Updated 6 years ago
- Notes on "Penetration Testing: A Hands-On Guide To Hacking"☆55Updated 6 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆57Updated 7 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 5 years ago