My preparation notes for CompTIA PenTest+ Certification Exam Objectives, exam number PT0-001
☆21Mar 23, 2018Updated 8 years ago
Alternatives and similar repositories for comptia-pentest-notes
Users that are interested in comptia-pentest-notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of notes and resources for the CompTIA PenTest+ exam.☆41Aug 24, 2019Updated 6 years ago
- CompTIA Pentest+ (Ethical Hacking) Course and Practice Exam, published by Packt☆123Jan 30, 2023Updated 3 years ago
- A script to analyze geographic GSuite Login activity☆10Sep 3, 2017Updated 8 years ago
- Monitors Twitter for new tweets with filter capabilities, lightning-fast using Tweepy's Stream API☆11Jul 27, 2019Updated 6 years ago
- NSEC3 Zone Walker☆13Nov 27, 2025Updated 5 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆13May 9, 2017Updated 9 years ago
- ☆19Dec 8, 2014Updated 11 years ago
- ☆16May 17, 2018Updated 8 years ago
- A plugin for splitting the scoreboard based on team attributes☆14Dec 28, 2023Updated 2 years ago
- Notifications when metasploit msf session up or down in telegram.☆11Feb 20, 2018Updated 8 years ago
- Generate 1337 speak permutations of words from a wordlist☆21Dec 20, 2017Updated 8 years ago
- 🧾 Collection of resources to study for CompTia Pentest+ exam (PT0-002).☆29Jun 30, 2021Updated 4 years ago
- ☆18Dec 16, 2023Updated 2 years ago
- Parser to convert BURP Pro .XML to .CSV and build a Word .Docx Template☆14Dec 8, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆24May 11, 2016Updated 10 years ago
- ☆21Nov 18, 2025Updated 6 months ago
- A command line Swiss army knife for string and number conversions☆18Feb 27, 2026Updated 2 months ago
- A simple Impacket-based tool to check a set of credentials against many Windows hosts and get permission for SMB shares.☆13Dec 26, 2025Updated 4 months ago
- ☆26Apr 23, 2021Updated 5 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 13 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆33Nov 4, 2022Updated 3 years ago
- 16-bit brainfuck cpu☆32Jan 18, 2013Updated 13 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Apr 25, 2017Updated 9 years ago
- Cryptanalysis library for breaking classical ciphers☆26Jun 10, 2019Updated 6 years ago
- SFDL Bash Loader☆10Aug 21, 2020Updated 5 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆31Feb 22, 2023Updated 3 years ago
- Ruby On Rails unrestricted render() exploit☆16Feb 9, 2018Updated 8 years ago
- Slide Decks for the Majority of my Talks☆63Apr 25, 2024Updated 2 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 8 months ago
- Personal settings for X-Ways Forensics☆35Apr 28, 2022Updated 4 years ago
- ☆10Jun 2, 2020Updated 5 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- CTFd plugin allowing for individual Docker containers per team☆26Jun 27, 2022Updated 3 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 10 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Tools for analyzing Windows containers and break container's isolation☆33Aug 2, 2022Updated 3 years ago
- syscall hijacking in 2019☆13Feb 25, 2019Updated 7 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 8 years ago
- Simple command-line utility to import Postfix mail.log files into database storage (MongoDB or MySQL/MariaDB)☆14Feb 19, 2014Updated 12 years ago