CherryTree OSCP methodology template
☆15Dec 10, 2018Updated 7 years ago
Alternatives and similar repositories for OSCP_Template
Users that are interested in OSCP_Template are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆18Jun 5, 2020Updated 5 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- Library of sites for categorization☆28Feb 12, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Next major release of sniffMyPackets - Now with added packet loving☆12Mar 19, 2015Updated 11 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Use struct tags to read environment variables.☆13Mar 23, 2021Updated 5 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- HTTPS Client for www.random.org, optional use of TOR proxy☆14Feb 2, 2014Updated 12 years ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated last year
- Stenographer is a packet capture solution which aims to quickly spool all packets to disk, then provide simple, fast access to subsets of…☆11Jan 22, 2019Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆19Mar 6, 2018Updated 8 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- Virtual scenario for Network Penetration Testing☆14Mar 19, 2017Updated 9 years ago
- Launchd daemon that reports major OSX modifications through growl☆16Feb 19, 2015Updated 11 years ago
- A homebrewed cyber threat intelligence solution☆20Nov 20, 2012Updated 13 years ago
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 8 years ago
- Script for system monitoring☆13Nov 30, 2012Updated 13 years ago
- Dockerfiles for containerized osquery☆14May 23, 2017Updated 8 years ago
- ☆14May 22, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- KCSEC Rubber Ducky Tookit☆11Jul 12, 2018Updated 7 years ago
- Bro Snippets☆21Nov 7, 2014Updated 11 years ago
- PoC code of AOT poisoning presented at Black Hat Asia 2023☆12May 10, 2023Updated 2 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- Presentation Slides and Resources☆16Jun 12, 2024Updated last year
- Gobbling it's way through your pcap files☆24Oct 23, 2014Updated 11 years ago
- ☆14Mar 19, 2024Updated 2 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- massively concurrent web scraping☆24Apr 19, 2009Updated 16 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆17Nov 18, 2025Updated 4 months ago
- ☆11Oct 16, 2022Updated 3 years ago
- Ease and assist the compromise of an Active Directory environment.☆30Sep 17, 2021Updated 4 years ago
- ☆48Nov 18, 2020Updated 5 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Nov 30, 2018Updated 7 years ago
- A set of tools and procedures for automating NSM and NIDS deployments in AWS☆15Oct 16, 2020Updated 5 years ago