☆17Jul 17, 2023Updated 2 years ago
Alternatives and similar repositories for offsec-notes
Users that are interested in offsec-notes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Dec 22, 2022Updated 3 years ago
- Blog☆10Jul 18, 2023Updated 2 years ago
- CPSA exam prep resources☆18Sep 11, 2024Updated last year
- Powershell - Simple HTTP Server☆13Feb 17, 2022Updated 4 years ago
- Alias identity manager for Red Teams, OSINT collectors, journalists, and privacy-conscious people☆21Oct 27, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- toolings for pentester to makes their life easier☆11Feb 25, 2023Updated 3 years ago
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 6 months ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Oct 18, 2020Updated 5 years ago
- A template for documenting penetration tests with OneNote.☆21Feb 15, 2020Updated 6 years ago
- ".ashx" Web Shell☆16Aug 18, 2014Updated 11 years ago
- ☆14Aug 10, 2022Updated 3 years ago
- Precompiled binaries for windows & Linux☆34Jun 11, 2025Updated 10 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A GO client API REST for VmWare Workstation Pro☆22Jun 11, 2025Updated 9 months ago
- ☆33Aug 25, 2021Updated 4 years ago
- Generate Claude Code bug bounty skills from public HackerOne reports and GitHub writeups — 18 vuln classes, no private reports needed☆131Mar 12, 2026Updated 3 weeks ago
- ☆15Nov 15, 2023Updated 2 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23May 31, 2020Updated 5 years ago
- ☆22Jul 16, 2021Updated 4 years ago
- Scripts I created to pass the OSCP☆22Jul 23, 2021Updated 4 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆395Dec 19, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- A curated list of awesome ATM hacking resources.☆21Dec 4, 2025Updated 4 months ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆119Aug 2, 2023Updated 2 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- Steal user's password when running sudo for post-exploitation purposes☆44Sep 29, 2020Updated 5 years ago
- Active Directory Pentesting Full Course - Red Team Hacking☆31Dec 13, 2021Updated 4 years ago
- 1☆14Aug 17, 2022Updated 3 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- ☆24Aug 20, 2025Updated 7 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- List Security Guide☆19Feb 24, 2021Updated 5 years ago
- Go script to guess an API key / OAuth token found during pentest. CLI version of https://github.com/daffainfo/apiguesser-web/☆45Aug 28, 2022Updated 3 years ago
- Bootstraps, cheat-sheets, and guides for the OSCP exam.☆90May 21, 2024Updated last year
- Guide to SSRF☆75Oct 10, 2023Updated 2 years ago
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆15Nov 9, 2013Updated 12 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated 2 years ago