dn4hc / CREST-Exam-PrepView external linksLinks
Cheatsheets and write ups for the CREST CRT and CCT Exams.
☆20Aug 5, 2020Updated 5 years ago
Alternatives and similar repositories for CREST-Exam-Prep
Users that are interested in CREST-Exam-Prep are comparing it to the libraries listed below
Sorting:
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆16Jun 9, 2023Updated 2 years ago
- Insert, Retrieve, Update and Delete data from SQLite database in Android☆12Jan 6, 2012Updated 14 years ago
- Learning Python for Forensics, Second Edition, Published by Packt☆11Apr 5, 2019Updated 6 years ago
- ☆13Updated this week
- This cheatsheet contains Active Directory (AD) exploitation techniques, showcasing methods used to identify and abuse misconfigurations o…☆54Jan 22, 2024Updated 2 years ago
- OSCP tools and notes☆40Jan 21, 2019Updated 7 years ago
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- A Postcard Style E-ink (E-Paper) Weather Station (supports 4 color / greyscale) for ESP32, using Hong Kong Observatory Open API☆13Jul 25, 2025Updated 6 months ago
- ☆11Apr 2, 2022Updated 3 years ago
- A repository hosting some of my own vulnerability reports and proof-of-concepts.☆15Aug 8, 2019Updated 6 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- RemClip is a C# project which permits to steal user clipboard data and send it to a remote web server under attacker control☆15Sep 2, 2024Updated last year
- Python SDK and CLI utility for searchcode.com.☆10Feb 3, 2026Updated last week
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- Power BI templates for Exchange Online Protection and Office 365 Advanced Threat Protection reporting☆13Sep 9, 2020Updated 5 years ago
- A script used to query the dehashed API and filter for more useful results☆17Jun 20, 2021Updated 4 years ago
- Converts an IP Address range to CIDR blocks in Go☆11Feb 10, 2021Updated 5 years ago
- Network forensics tool to parse pcap and provide visualizations using D3.js☆15Aug 19, 2013Updated 12 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Aug 15, 2022Updated 3 years ago
- Collection of scripts and tools related to the eCTHPv2 exam by INE.☆18Jun 12, 2022Updated 3 years ago
- • Packet capture (PCAP) file analysis to analyze traffic sent by malicious IP address.☆12Jan 1, 2015Updated 11 years ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆17Mar 19, 2025Updated 10 months ago
- Thor Artifacts for Velociraptor☆19Dec 2, 2025Updated 2 months ago
- Remote C2-style MCP server for Frida instrumentation on rooted Android☆30Jan 31, 2026Updated 2 weeks ago
- VisualFirewall/IDS is a research-grade Firewall and IDS visualization tool that aims to provide a highly-informative interface of network…☆15Oct 6, 2014Updated 11 years ago
- Azure OpenAI Playbook created for Microsoft Sentinel☆13May 2, 2024Updated last year
- Interacting with Cisco FTD devices via the FDM REST API in Python☆12Feb 6, 2022Updated 4 years ago
- Simple scripts aiding penetration testing process☆15Mar 10, 2020Updated 5 years ago
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆15Apr 29, 2022Updated 3 years ago
- Embedded, small and composable Zero-Trust Teamserver made for collaborative Go programs or CLI applications.☆13Jul 10, 2025Updated 7 months ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 6 years ago
- Conquer the deep ocean, host an .onion site fast!☆16Oct 12, 2022Updated 3 years ago
- Mobile Forensic Academic Articles☆13Jun 8, 2017Updated 8 years ago
- Generic plugin based web application security fuzzing for anomalies by Slándáil Research Limited☆13Feb 13, 2024Updated 2 years ago
- Convert batch script to executable with advanced obfuscator. Based on Batch-Obfuscator bat2exe very advanced and very well made.☆14Jan 5, 2022Updated 4 years ago
- Copy metadata and digital signatures information from one Windows executable to another using Wine on a non-Windows platform☆19Apr 17, 2024Updated last year
- A Microsoft Threat Modelling tool template for ICS threat modelling☆13Aug 20, 2020Updated 5 years ago