PEN-103-Kali-Linux-Revealed-KLR-Cheat-Sheet
☆29Oct 19, 2025Updated 6 months ago
Alternatives and similar repositories for PEN-103-Kali-Linux-Reinvented-KLCP-Certification
Users that are interested in PEN-103-Kali-Linux-Reinvented-KLCP-Certification are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Repository_Software☆11Aug 26, 2023Updated 2 years ago
- Study guide and command sheet for Offensive Security PEN-210 course (Offensive Security Wireless Pentester - OSWP)☆108Nov 11, 2023Updated 2 years ago
- Workshop on Git for NTU Open Source Society☆12Oct 19, 2018Updated 7 years ago
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- Script to parse Aircrack-ng captures into a SQLite database and extract useful information like handshakes, MGT identities, interesting r…☆127Oct 24, 2025Updated 6 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Hack facebook using this python script - Kali Linux☆15Jun 14, 2021Updated 4 years ago
- ☆14Nov 12, 2024Updated last year
- This repository offers a thorough explanation of the Diffie-Hellman export grade attack, accompanied by a demo.☆10Apr 18, 2025Updated last year
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Oct 6, 2022Updated 3 years ago
- Toy version of the sweet32 attack☆16Nov 24, 2017Updated 8 years ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆49Oct 29, 2023Updated 2 years ago
- Hacking android device using Kali linux☆20Apr 29, 2017Updated 9 years ago
- Kali Linux, built from initial Debian Jessie, using Vagrant, for deployment to Amazon☆17Dec 10, 2016Updated 9 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- DDoS Toolkit is an advanced multi-vector load testing tool designed to simulate high traffic on a target server, commonly referred to as …☆14Apr 21, 2025Updated last year
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆44Jul 13, 2023Updated 2 years ago
- Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.☆18Feb 20, 2022Updated 4 years ago
- This repository is dedicated to documenting and sharing bug bounty reports. The goal is to help security researchers and developers: Le…☆13Mar 4, 2026Updated 2 months ago
- A deliberately vulnerable js app made with reactjs. For educational purposes.☆17Mar 20, 2019Updated 7 years ago
- SOCMINT tool to find social media accounts.☆33Sep 12, 2024Updated last year
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Ferramenta para criação de payload HID para android sem nethunter e sem rubber ducky☆10Jul 4, 2018Updated 7 years ago
- Empty project to quick start Proof of Concept app development☆34Feb 15, 2025Updated last year
- CZ3004/SC2079 Multidisciplinary Project (MDP) - Raspberry Pi☆21Aug 15, 2024Updated last year
- DuckyLogger: DuckyLogger is a Key Logger which captures every key stroke of traget and send them to attacker.☆10Apr 14, 2022Updated 4 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆31Apr 15, 2018Updated 8 years ago
- Let's you use any Windscribe server over a HTTP proxy. Uses Docker so multiple HTTP proxies at different locations can be created on the …☆12Jan 4, 2019Updated 7 years ago
- PHP文件上传漏洞☆11Jun 11, 2018Updated 7 years ago
- ☆52Oct 10, 2025Updated 6 months ago
- This is a repository for storing all of the scripts, documentation, binaries, etc. required to setup a Samsung Galaxy Note 10.1 2014 Edit…☆12Oct 17, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Notes on Kali Linux on Nethunter by hcs0☆12Oct 13, 2019Updated 6 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- Bleichenbacher's PKCS 1.5 Padding Oracle Attack.☆17Mar 7, 2021Updated 5 years ago
- This is a Python script that generates a staged payload that fully bypasses MS Defender. Can potentially be used for EDRs with some custo…☆77Mar 31, 2026Updated last month
- OTP BOSS is the most advanced and versatile OTP & SMS capture bot that is capable of getting OTP & SMS codes from victims by impersonatin…☆24Nov 21, 2021Updated 4 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago