☆66Jul 12, 2025Updated 7 months ago
Alternatives and similar repositories for PNPT
Users that are interested in PNPT are comparing it to the libraries listed below
Sorting:
- tools, files, and scripts I use for PNPT and CRTO☆23Feb 21, 2022Updated 4 years ago
- PNPT Exam Preparation - TCM Security☆171Jul 25, 2021Updated 4 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆46Oct 26, 2025Updated 4 months ago
- A Next-Gen Wordpress Hacker Backend☆19May 27, 2018Updated 7 years ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- ☆13Jun 26, 2025Updated 8 months ago
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- ☆13Sep 8, 2024Updated last year
- Study notes from PortSwigger's Web Security Academy☆30Jan 6, 2023Updated 3 years ago
- Resources from B-Sides Bloomington OSINT Workshop☆13Sep 14, 2024Updated last year
- PowerShell-based utility for mapping byte offsets to source code using hex and ASCII context for detection research and red team tooling.☆31Dec 31, 2025Updated 2 months ago
- Web Application Penetration Testing☆148May 4, 2025Updated 10 months ago
- PowerShell script to DCSync NT-Hashes from an Active Directory Domain Controller (DC)☆17Feb 6, 2026Updated 3 weeks ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- Tools, Resources & Helpful Tips☆14Jul 21, 2022Updated 3 years ago
- backdoor exploit for vsftpd 2.3.4 on python☆16Oct 14, 2023Updated 2 years ago
- My bug bounty notes☆35Apr 10, 2021Updated 4 years ago
- Empower your enumeration during OSCP☆36Dec 7, 2018Updated 7 years ago
- Repo for hosting rayder workflows☆63Aug 31, 2023Updated 2 years ago
- List of XSS Payloads☆15Jul 5, 2022Updated 3 years ago
- BUG HUNTING/WEB APPLICATION PENTESTING CHECKLIST☆15May 30, 2023Updated 2 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- Dump Linux keyrings☆24Jul 15, 2024Updated last year
- My Gitbook CyberSec Notes☆20Oct 22, 2025Updated 4 months ago
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 8 years ago
- XSS PoCs to elevate your alert()☆22May 18, 2023Updated 2 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆14Aug 7, 2019Updated 6 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Aug 13, 2019Updated 6 years ago