After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please don't keep you knowledge limited to my notes, I might have missed something important for anyone because I already knew about it.
☆16Jun 9, 2023Updated 2 years ago
Alternatives and similar repositories for CREST_CPSA
Users that are interested in CREST_CPSA are comparing it to the libraries listed below
Sorting:
- Cheatsheets and write ups for the CREST CRT and CCT Exams.☆20Aug 5, 2020Updated 5 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- Weaponized VSCode Extensions☆15Feb 22, 2026Updated last month
- Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for m…☆12Feb 1, 2022Updated 4 years ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Dec 6, 2024Updated last year
- Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit☆14Mar 16, 2022Updated 4 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆30Oct 1, 2024Updated last year
- A compilation of network scanning strategies to find vulnerable devices☆73Nov 6, 2022Updated 3 years ago
- Collection of Tools & Techniques for analyzing URLs☆33Oct 1, 2023Updated 2 years ago
- ☆25Feb 11, 2024Updated 2 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- ☆17May 7, 2021Updated 4 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Sep 16, 2024Updated last year
- A Burp extension to show the Collaborator client in a tab☆24Dec 23, 2022Updated 3 years ago
- Penetration Testing Checklist☆37May 14, 2020Updated 5 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- ☆52Oct 10, 2025Updated 5 months ago
- .NET assembly loader with patching AMSI and ETW bypass☆31Apr 16, 2025Updated 11 months ago
- ☆10Aug 4, 2020Updated 5 years ago
- A C# utility for interacting with SCOM☆96Dec 2, 2025Updated 3 months ago
- ☆39Mar 31, 2025Updated 11 months ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- A Deep Learning Approach for Password Guessing☆24Jun 1, 2023Updated 2 years ago
- PowerShell tool that shows how to read and write NTLM OWF values via samlib.dll.☆72Oct 22, 2025Updated 5 months ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 10 months ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 11 months ago
- ☆13Mar 28, 2024Updated last year
- ☆61Oct 9, 2023Updated 2 years ago
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Sep 13, 2025Updated 6 months ago
- Ffuf output browser☆39Feb 25, 2023Updated 3 years ago
- Mockingjay process self injection POC☆50Aug 8, 2023Updated 2 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- Oyedata is a tool to perform OData assessments☆13Aug 3, 2012Updated 13 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Ease and assist the compromise of an Active Directory environment.☆31Sep 17, 2021Updated 4 years ago