Handbook and survival guide for hacking over the wire, OSCP-style
☆43Nov 2, 2020Updated 5 years ago
Alternatives and similar repositories for wired-courtyard
Users that are interested in wired-courtyard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆139May 17, 2017Updated 8 years ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- Collection of things made during my OSCP journey☆266Dec 19, 2017Updated 8 years ago
- ☆50Sep 24, 2020Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆16Oct 26, 2021Updated 4 years ago
- Alphanumeric Encoder☆25Oct 10, 2018Updated 7 years ago
- An Intro to Penetration Testing Workshop☆15May 31, 2018Updated 7 years ago
- Just some exploits :P☆47Jan 18, 2021Updated 5 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- Solutions to CTF problems.☆11May 29, 2016Updated 9 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 5 years ago
- Material from CTF machines I have attempted☆39Jul 5, 2021Updated 4 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆509Apr 22, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆483Aug 4, 2020Updated 5 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- Machines and Challenges☆40Oct 3, 2019Updated 6 years ago
- ☆23Nov 18, 2015Updated 10 years ago
- External Penetration Testing - Holo Corporate Network - TryHackMe - Holo Network☆11Oct 3, 2021Updated 4 years ago
- A python tool capable of creating HUGE wordlists. Has the ability to add custom words for concatenation in any way you see fit.☆15Nov 20, 2021Updated 4 years ago
- CTF writeups☆29Apr 8, 2019Updated 7 years ago
- BinaryView Plugin for Microcorruption CTF memory dumps☆13Jul 16, 2019Updated 6 years ago
- My solutions to RingZer0 CTF programming challenges☆15Aug 15, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- …(⊙_⊙;)…☆56Mar 31, 2021Updated 5 years ago
- Networking and attacking scripts.☆10Apr 20, 2017Updated 8 years ago
- ☆12Mar 24, 2018Updated 8 years ago
- This contains a bundle with an executable to exploit ms17-010 remote or locally. It does not require Python.☆16Jan 10, 2019Updated 7 years ago
- Dirtycow exploit for both 32 and 64-bit☆29Jul 23, 2018Updated 7 years ago
- A project aimed at automating and making repetitive tasks easy while pentesting , like creating msf payloads or a one-liner reverse shel…☆11Nov 14, 2022Updated 3 years ago
- Force link all static lib symbols into .exe target, for full code coverage measure on windows.☆15Jun 14, 2015Updated 10 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A collection of open source and commercial tools that aid in red team operations.☆10Jun 12, 2019Updated 6 years ago
- S3 Buckets that will let you list all files inside them☆14Apr 26, 2018Updated 7 years ago
- Experimental kernel-level remote shell based on ICMP content☆15Aug 26, 2020Updated 5 years ago
- OSCP cheet sheet☆201Oct 21, 2020Updated 5 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 9 years ago
- PoC of Imagemagick's Arbitrary File Read☆13Jul 3, 2023Updated 2 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆32Dec 23, 2019Updated 6 years ago