CherryTree OSCP methodology template
☆15Dec 10, 2018Updated 7 years ago
Alternatives and similar repositories for OSCP_Template
Users that are interested in OSCP_Template are comparing it to the libraries listed below
Sorting:
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Tool for finding Buffer Overflows in simple binaries. CTF use mainly.☆19Mar 6, 2018Updated 7 years ago
- Library of sites for categorization☆28Feb 12, 2019Updated 7 years ago
- ☆11Jul 19, 2022Updated 3 years ago
- ☆33Dec 10, 2024Updated last year
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.☆10Jan 1, 2025Updated last year
- Cookiecutter template for creating Ansible roles. Includes tests for TravisCI using Molecule.☆13Dec 14, 2021Updated 4 years ago
- Tool support for literature review subtle process.☆18May 5, 2017Updated 8 years ago
- PowerShell script to disable NetBIOS on Windows☆12Jul 19, 2021Updated 4 years ago
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- Range Traffic Generator - Used to simulate browsing traffic on a range.☆11May 24, 2017Updated 8 years ago
- Scripts used to create ISO installers of ROCK for offline installation.☆10Mar 13, 2023Updated 2 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 6 months ago
- (OS X) Drains battery of laptops via a script. Originally used in an educational-setting to store computers over the summer.☆10May 5, 2014Updated 11 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- a markov based rule generator for hashcat/mdxfind/jtr☆24Dec 8, 2025Updated 2 months ago
- Script for system monitoring☆13Nov 30, 2012Updated 13 years ago
- Collection of PowerShell scripts to interact with SCCM 2012☆16Oct 19, 2019Updated 6 years ago
- Bro scripts to monitor for new hosts within a subnet range that aren't whitelisted/vetted.☆13Jun 28, 2013Updated 12 years ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- Next major release of sniffMyPackets - Now with added packet loving☆12Mar 19, 2015Updated 10 years ago
- HTTPS Client for www.random.org, optional use of TOR proxy☆14Feb 2, 2014Updated 12 years ago
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆11Apr 3, 2023Updated 2 years ago
- Fix Mac OS X time using ntpdate☆13Oct 12, 2014Updated 11 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆17Nov 18, 2025Updated 3 months ago
- ☆48Nov 18, 2020Updated 5 years ago
- Script to create Onion Mirror for Clearnet site based on Enterprise Onion Toolkit☆14Aug 30, 2021Updated 4 years ago
- Arp Spoof and inject beef hook in seconds☆13Feb 2, 2014Updated 12 years ago
- ☆11Oct 16, 2022Updated 3 years ago
- An OSINT tool to find data leaks on a targeted website☆17Mar 30, 2021Updated 4 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- ☆10Aug 24, 2024Updated last year
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 2 years ago
- This repository contains the technique presented at SOCON2025 for stealing cookies silently from MacOS Sequoia with only root privileges☆12Mar 27, 2025Updated 11 months ago
- Backup system for system administrators who require reliable backups with minimum fuss.☆22Jan 1, 2026Updated last month
- Lockstitch is an incremental, stateful cryptographic primitive for symmetric-key cryptographic operations (e.g. hashing, encryption, mess…☆12Feb 5, 2026Updated 3 weeks ago