Notes in preparation for the PNPT (Practical Network Penetration Testing) Certification Exam
☆61Apr 30, 2023Updated 2 years ago
Alternatives and similar repositories for PNPT
Users that are interested in PNPT are comparing it to the libraries listed below
Sorting:
- tricks I discovered while playing king of the hill☆17Jun 28, 2023Updated 2 years ago
- My notes while studying for the PNPT from TCM Security.☆98Apr 24, 2024Updated last year
- My notes while studying for the PNPT from TCM Security.☆81Mar 30, 2024Updated last year
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆21Aug 20, 2024Updated last year
- ☆20Sep 2, 2021Updated 4 years ago
- ☆34May 14, 2018Updated 7 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- bash script for automating subdomain enumeration process either passive or active☆29Feb 24, 2026Updated last week
- All of my personal notes on topics including Hacking, Coding, Math, Data-Structures, and more! Open to all for use!☆131Feb 10, 2026Updated 3 weeks ago
- Final assignment for the course Data Visualization with Python, part of IBM Data Science Professional Certification on Coursera☆11Jun 22, 2020Updated 5 years ago
- Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source …☆13Dec 31, 2023Updated 2 years ago
- ☆36Nov 26, 2024Updated last year
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆81Aug 20, 2023Updated 2 years ago
- Penetration Testing Student version 2 simple condensed NOTES for quick recap☆215Sep 9, 2022Updated 3 years ago
- Command Execution exploiter with an auto connection handling☆32Jun 15, 2022Updated 3 years ago
- Notepad++ syntax highlighting and autocompletion for SQF (the scripting language for the ArmA games)☆12Apr 11, 2025Updated 10 months ago
- A small utility to generate a word security report by using a knowledge base(XLSX).☆12Nov 25, 2023Updated 2 years ago
- Extrae ip de numeros de telefono☆10Aug 28, 2023Updated 2 years ago
- ☆33Feb 27, 2024Updated 2 years ago
- A curated collection of tools, bots, and resources for Open Source Intelligence (OSINT) investigations on Telegram. Includes chat analysi…☆56Oct 5, 2025Updated 5 months ago
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Nov 3, 2025Updated 4 months ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆150Mar 20, 2024Updated last year
- ☆42Dec 26, 2022Updated 3 years ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆44Oct 29, 2023Updated 2 years ago
- ☆14May 14, 2022Updated 3 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 weeks ago
- Dungeons and Dragons 5e Guide☆14Jun 2, 2018Updated 7 years ago
- It is a ML based project developed in python language. It detect and recognize the face and mark attendance of that person. It's good poi…☆10Aug 13, 2023Updated 2 years ago
- Official writeups for Cyber Apocalypse CTF 2025: Tales from Eldoria☆195Apr 1, 2025Updated 11 months ago
- ☆87Sep 27, 2022Updated 3 years ago
- My Notes about Penetration Testing☆730Jan 17, 2026Updated last month
- The repository contains Criminal IP Asset Search data in STIX 2.1 JSON format, enabling a quick understanding of threat information for s…☆11Jan 29, 2024Updated 2 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆14Jun 2, 2024Updated last year
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- A Simple CTFd Plugin that will act as a flag generator and validator☆13Nov 23, 2023Updated 2 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- CS480 - Fall 2019 - Class Materials☆13Nov 22, 2019Updated 6 years ago