Template project for Offensive Security Exam Documentation
☆11Feb 25, 2020Updated 6 years ago
Alternatives and similar repositories for offsec-exam
Users that are interested in offsec-exam are comparing it to the libraries listed below
Sorting:
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Mar 2, 2019Updated 7 years ago
- Python script to launch burp scans automatically☆32Jul 18, 2021Updated 4 years ago
- Versatile tool for managing wordlists☆11Jul 15, 2021Updated 4 years ago
- Remove NotebookLM watermarks from slides. Local processing, no upload needed.☆35Jan 15, 2026Updated last month
- Supplementary Repository for writing a Python Load balancer Tutorial☆10May 17, 2020Updated 5 years ago
- ☆37Jul 25, 2019Updated 6 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆45Sep 28, 2020Updated 5 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- kab the lab manager☆11Oct 16, 2020Updated 5 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- A simulation of the RFCTF KOTH game.☆10Aug 14, 2020Updated 5 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- Files related to works published in Black Mass☆10Sep 16, 2023Updated 2 years ago
- ☆14Nov 16, 2024Updated last year
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- This is a Docker Container with a script to crack pcap files with Hashcat. The aim of the project is to automate the processing of Hashes…☆11Jan 31, 2021Updated 5 years ago
- ☆10May 27, 2021Updated 4 years ago
- Add tracking hidden image to Word documents☆16Aug 30, 2017Updated 8 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- ☆15May 3, 2024Updated last year
- Keyword monitoring tool for .onion sites — threat intelligence & brand monitoring☆54Feb 23, 2026Updated last week
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆12Aug 12, 2021Updated 4 years ago
- Collection of HTTP scanners and fuzzers.☆11Jan 23, 2025Updated last year
- ☆12Feb 8, 2018Updated 8 years ago
- SLAM - Simple Local Area Monitor is a lightweight tool for continuous local network monitoring and device discovery.☆18Jul 9, 2025Updated 7 months ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- ☆17Apr 27, 2025Updated 10 months ago
- Interactive workshop for using Falco, a security tool in the CNCF☆10Jan 22, 2021Updated 5 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- ☆17Jan 9, 2025Updated last year
- A simple password cracker written in Go, designed to search for a specific hashed password in a wordlist.☆13Feb 23, 2024Updated 2 years ago
- Zone transfer a domain from its own NS servers and bruteforce subdomains☆12Mar 8, 2025Updated 11 months ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- A Python script to find and watch YouTube videos from the terminal without requiring API keys.☆12Feb 28, 2025Updated last year
- ☆12Apr 10, 2023Updated 2 years ago
- Learning material for completely newcomers in the field of BOFs☆14Apr 11, 2020Updated 5 years ago
- Image Steganography using K-Means clustering and DES encryption☆11Dec 7, 2020Updated 5 years ago