darkt3rr0r / OSCP-Prep
Resources, Tips, Tricks , Resources, Notes and much more
☆21Updated last year
Related projects: ⓘ
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆56Updated 4 years ago
- AWS S3 open bucket poc automated script.☆55Updated 3 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated 2 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆22Updated 3 years ago
- ☆25Updated last month
- KeepNote For OSCP Course☆22Updated 4 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 5 years ago
- ☆52Updated this week
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆74Updated 2 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 4 years ago
- Another Subdomain ENumeration Tool☆10Updated last year
- part of my wordlist to bruteforce DNS to find subdoamains.☆62Updated 3 years ago
- ☆43Updated this week
- Journey to Try Harder !!!☆29Updated 5 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Updated 6 years ago
- ☆27Updated 5 years ago
- ☆16Updated 3 years ago
- ☆37Updated 3 years ago
- ☆16Updated this week
- Scripts and tools for AWS Pentest☆51Updated 3 years ago
- OSWE Preparation☆37Updated 5 years ago
- ☆47Updated 3 months ago
- Handy bash and python scripts for bug bounty hunting!☆47Updated 3 years ago
- Buffer Overflows☆29Updated 3 years ago
- ☆21Updated 3 years ago
- Notes from OSCP, CTF, security adventures, etc...☆53Updated 7 months ago
- ☆71Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆18Updated 3 years ago
- In this repository I'll host my research and methodologies for auditing vulnerabilities☆29Updated 4 years ago