adithyan-ak / Slides
The repo contains all the slide deck that was used during my presentation at various webinars, conferences, and meetups.
☆56Updated 3 years ago
Alternatives and similar repositories for Slides:
Users that are interested in Slides are comparing it to the libraries listed below
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆59Updated 5 years ago
- ☆99Updated last year
- My OSCP journey☆158Updated 2 years ago
- ☆115Updated 4 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆89Updated last year
- High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your o…☆99Updated 2 years ago
- eJPT CheatSheet☆28Updated 3 years ago
- ☆99Updated 4 years ago
- Scripts created to use with the OSCP exercises☆46Updated 2 years ago
- Let's try harder...☆18Updated 3 years ago
- ☆137Updated 3 years ago
- Scripts and things that I have created when I was doing OSCP.☆43Updated 5 years ago
- A collection of resources I'm using while working toward the OSCP☆77Updated 2 years ago
- A curated list of different pentesting resources☆29Updated 2 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆63Updated 3 years ago
- ☆65Updated 2 years ago
- ☆21Updated 2 years ago
- Notes on ECPPT☆22Updated 6 years ago
- An OSWE Guide☆111Updated 3 years ago
- ☆76Updated 3 years ago
- ☆73Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆62Updated 5 years ago
- ☆93Updated 3 years ago
- Opening the door, one reverse shell at a time☆182Updated 3 years ago
- OSCP tools and notes☆41Updated 5 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆41Updated 4 years ago
- OSCP preparation tools, scripts and cheatsheets☆56Updated 2 years ago
- A random set of 5 machines for OSCP☆165Updated 4 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 5 years ago
- ☆125Updated 3 years ago