☆45Aug 27, 2024Updated last year
Alternatives and similar repositories for oscp-certification
Users that are interested in oscp-certification are comparing it to the libraries listed below
Sorting:
- PowerShell Module that converts MSG files to EML files☆11Sep 5, 2019Updated 6 years ago
- Add your configs for tmux☆18Apr 3, 2022Updated 3 years ago
- ☆10Jul 28, 2021Updated 4 years ago
- Python CLI covering the FileScan.IO API - enabling automatic interaction with www.filescan.io or private instances☆16Jul 15, 2025Updated 7 months ago
- Recon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnais…☆12May 28, 2022Updated 3 years ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15May 8, 2020Updated 5 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- POC for a basic C2 server using the python aiohttp framework☆15Mar 22, 2020Updated 5 years ago
- openvpn server configs☆14May 12, 2016Updated 9 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Nov 25, 2022Updated 3 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Feb 7, 2018Updated 8 years ago
- Python 3 script for interacting with Shodan API☆20Nov 4, 2024Updated last year
- H&E- Burp Highlighter and Extractor☆18Mar 29, 2023Updated 2 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14May 29, 2021Updated 4 years ago
- openVAS with ansible☆21Apr 22, 2015Updated 10 years ago
- Burp Suite extension for extracting metadata from files☆20Dec 29, 2020Updated 5 years ago
- Intelligence gathering framework☆16Jul 23, 2015Updated 10 years ago
- My personal repository☆13Jan 18, 2026Updated last month
- Data EXfiltration TestER☆21Aug 28, 2019Updated 6 years ago
- huntr.dev public disclosures/hacktivity watcher☆16Nov 5, 2023Updated 2 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆18Mar 24, 2025Updated 11 months ago
- a vulnerable GraphQL application☆20Dec 13, 2019Updated 6 years ago
- Subdomain Enumeration Wordlist. 8956437 unique words. Updated.☆75May 23, 2020Updated 5 years ago
- ☆27May 6, 2025Updated 9 months ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Feb 1, 2019Updated 7 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- Use Tor for anonymous scanning with nmap☆93Jun 19, 2015Updated 10 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- An implementation of a Model Context Protocol (MCP) for the Nuclei scanner. This tool enables context-aware vulnerability scanning by int…☆38Aug 4, 2025Updated 6 months ago
- ☆15Sep 21, 2019Updated 6 years ago
- A command based package for simple display of statistics☆25Dec 2, 2024Updated last year
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 4 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Aug 18, 2025Updated 6 months ago
- Other tools developed by CIRT.net☆23Aug 2, 2020Updated 5 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆29Jul 4, 2023Updated 2 years ago