botesjuan / PenTestMethodologyLinks
A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.
☆25Updated this week
Alternatives and similar repositories for PenTestMethodology
Users that are interested in PenTestMethodology are comparing it to the libraries listed below
Sorting:
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- OSWE Preparation☆38Updated 6 years ago
- Notes for CRTP☆42Updated 5 years ago
- ☆52Updated 8 years ago
- ☆32Updated 5 years ago
- ☆102Updated 6 years ago
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year
- A "Spring4Shell" vulnerability scanner.☆49Updated 11 months ago
- ☆73Updated 7 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆41Updated 5 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Updated 2 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 5 years ago
- OSCP guide and Red Team assessment Guide☆37Updated 5 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 5 years ago
- Noob Penetration tester☆11Updated 6 months ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- Pentest stuff☆49Updated 2 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆24Updated 5 years ago
- ☆20Updated 4 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- Template used for my OSCP exam.☆29Updated 3 years ago
- ☆38Updated 4 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆69Updated 5 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆82Updated 4 years ago
- Offensive Security Wireless Professional☆17Updated 5 years ago
- Script for Bug Bounty☆29Updated 4 years ago
- ☆24Updated 6 years ago
- Reverse Shell-able Windows exploits short POCs.☆34Updated 5 years ago
- Cheat sheet☆36Updated 6 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago