ahrixia / CREST_CPSA
After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please don't keep you knowledge limited to my notes, I might have missed something important for anyone because I already knew about it.
☆10Updated last year
Related projects ⓘ
Alternatives and complementary repositories for CREST_CPSA
- Automated compromise detection of the world's most popular packages☆15Updated last year
- Some good things for EXP-301 course☆11Updated 11 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated last year
- Workflow for pentesting web applications.☆21Updated 5 years ago
- C2Matrix Automation☆12Updated last year
- FireProx written in Go☆17Updated 6 months ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- HTTP requests of FrontPage expolit☆24Updated 10 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 6 months ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆19Updated 9 months ago
- H&E- Burp Highlighter and Extractor☆18Updated last year
- pwncat windows c2 components☆17Updated 3 years ago
- ☆12Updated 2 years ago
- S3 bucket enumerator☆29Updated 5 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Updated 2 years ago
- ☆16Updated last year
- Automate Auxiliary Module in Metasploit☆20Updated 3 years ago
- A multithreaded, queued SSH key and/or password spraying tool.☆17Updated last year
- ☆20Updated last year
- Create PDFs with HTML smuggling attachments that save on opening the document.☆27Updated last year
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆13Updated 2 years ago
- ☆14Updated last year
- ☆15Updated 7 months ago
- Simple tools to handle string and generate subdomain permutations☆14Updated 2 years ago