drak3hft7 / OSCP-Exam-Report-TemplateLinks
Template used for my OSCP exam.
☆29Updated 2 years ago
Alternatives and similar repositories for OSCP-Exam-Report-Template
Users that are interested in OSCP-Exam-Report-Template are comparing it to the libraries listed below
Sorting:
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- Notes for CRTP☆41Updated 4 years ago
- ☆22Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 5 years ago
- ☆20Updated 3 years ago
- ☆27Updated 5 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆57Updated 3 years ago
- Script for Bug Bounty☆29Updated 3 years ago
- Vulnerable SAML infrastructure training applicaiton☆53Updated 2 years ago
- ☆57Updated last year
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- A solid recon tool I use personally.☆30Updated 2 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆92Updated 2 years ago
- ☆75Updated 3 years ago
- ☆68Updated 2 years ago
- Information Security Information From Web☆27Updated this week
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆39Updated 2 years ago
- AWS S3 open bucket poc automated script.☆57Updated 3 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- Notes on Preparing for Offsec☆25Updated 2 years ago
- Exploit scripts☆12Updated 3 years ago
- This extension adds a search bar to the Repeater tab that can be used to highlight all repeater tabs where the request and/or response ma…☆79Updated last year
- An Automation Tool Written in Python which uses Twitter and GitHub API☆16Updated 3 years ago
- Enhanced 403 bypass header☆21Updated 2 years ago
- ☆20Updated 3 years ago
- ☆18Updated 2 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- Advanced Reconnaissance and Web Application Discovery☆88Updated 3 years ago
- These Repositories About My Recon Methodology To Give Some Idea For Other Hunter How To Do Recon☆43Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago