fraynal / challengesLinks
Small cyber challenges for fun and no profit
☆13Updated last month
Alternatives and similar repositories for challenges
Users that are interested in challenges are comparing it to the libraries listed below
Sorting:
- ☆180Updated 6 months ago
- CRY.ME (CRYptographic MEssaging application)☆168Updated 2 years ago
- Active Directory Mindmap Recipes: A Compromise à la Carte☆132Updated last month
- Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France☆138Updated 2 months ago
- Speed up your pentest enumeration☆84Updated last month
- Offline Cybersecurity Knowledge Base☆173Updated this week
- Outils ESD academy☆56Updated 3 years ago
- répertoire de publication web public☆1Updated 2 weeks ago
- A (hopefully) actively maintained activity-based-autosorted list of InfoSec Streamers☆240Updated this week
- My personal OT resource list, gather throughout research and internet adventure.☆92Updated last month
- ☆161Updated 9 months ago
- Pentest Report Generator☆412Updated last month
- A dynamic cheat sheet for PEN-200, OSCP, and other pentests made with Google Sheets☆67Updated last year
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆225Updated 7 months ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆145Updated last year
- Describing and documenting the process of deploying a HomeLab for security research and training☆38Updated 2 months ago
- A generic sysreptor template to write on-premise related Altered Security's certifications reports of compromission.☆15Updated 6 months ago
- Quick scripts I developed to streamline OSCP tasks☆143Updated last month
- SwitchToOpen - The open source shift☆200Updated this week
- A collection of Active Directory, phishing, mobile technology, system, service, web application, and wireless technology weaknesses that …☆247Updated 2 years ago
- My notes while studying for the PNPT from TCM Security.☆78Updated last year
- SkillArch☆30Updated this week
- Find CVEs associated to Linux and public exploits on github☆119Updated 3 months ago
- ☆664Updated last year
- Pre-Built Vulnerable Environments Based on Docker-Compose☆35Updated 6 months ago
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆171Updated this week
- GLPI vulnerabilities checking tool☆132Updated last month
- Lab solutions and commands from studying for the eLearnSecurity Junior Penetration Tester certificate.☆190Updated 3 years ago
- A comprehensive collection of resources, tools, tips, and guides for preparing and succeeding in the OSCP (Offensive Security Certified P…☆319Updated 3 weeks ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆318Updated 2 weeks ago