A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.
☆63Jul 3, 2021Updated 4 years ago
Alternatives and similar repositories for Field-Manual
Users that are interested in Field-Manual are comparing it to the libraries listed below
Sorting:
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- ☆168Oct 21, 2023Updated 2 years ago
- ☆32Oct 21, 2023Updated 2 years ago
- ☆76Mar 24, 2021Updated 4 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- Python template to assist with buffer overflows☆73Nov 12, 2019Updated 6 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- wew oscp☆280Jun 28, 2022Updated 3 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Jul 9, 2020Updated 5 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or …☆66Jun 29, 2019Updated 6 years ago
- Suggests programs to run against services found during the enumeration phase of a Pentest☆115Oct 25, 2025Updated 4 months ago
- Good For OSCP Training☆442Jan 26, 2019Updated 7 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Sep 17, 2020Updated 5 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Mar 2, 2019Updated 7 years ago
- Command List for Hashcat and default keyspaces.☆17Feb 13, 2020Updated 6 years ago
- AWS EC2 Security Group Auditor Tool☆16Nov 21, 2017Updated 8 years ago
- :e-mail: Enumerate usernames through SMTP service☆17Jun 30, 2019Updated 6 years ago
- Open Redirect scanner - (out of date)☆28Nov 27, 2022Updated 3 years ago
- a tool that gets all paths at robots.txt and opens it in the browser.☆14Aug 2, 2019Updated 6 years ago
- A python based semi-automatic buffer overflow exploit script☆16Sep 6, 2020Updated 5 years ago
- ☆18Nov 18, 2020Updated 5 years ago
- My experiences with Virtual Hacking Labs☆12Feb 7, 2020Updated 6 years ago
- Tools, Resources & Helpful Tips☆14Jul 21, 2022Updated 3 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆708Sep 4, 2024Updated last year
- Commands, snippets, exploits, tools, lists, collections and techniques I used on my journey to becoming an OSCP.☆306Mar 10, 2021Updated 4 years ago
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆100May 25, 2021Updated 4 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆113Dec 23, 2020Updated 5 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- List of XSS Payloads☆15Jul 5, 2022Updated 3 years ago
- CLI tool and python module which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc.☆50Feb 7, 2026Updated last month
- Script for Local Windows Enumeration☆31Mar 12, 2018Updated 7 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆18Jul 8, 2019Updated 6 years ago