iamrajivd / pentestLinks
☆173Updated 4 years ago
Alternatives and similar repositories for pentest
Users that are interested in pentest are comparing it to the libraries listed below
Sorting:
- OSCP cheatsheet☆107Updated last year
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆248Updated 3 months ago
- Awesome note-taking apps for hackers & pentesters !☆377Updated 4 years ago
- Tips for Penetration Testing☆130Updated 2 years ago
- Active Directory Cheat Sheet☆143Updated 4 years ago
- Capture The Flag | HackTheBox | OSCP | Bug Bounty Hunting | Jobs☆131Updated 5 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆241Updated 4 years ago
- A random set of 5 machines for OSCP☆166Updated 5 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆267Updated 2 years ago
- My OSCP notes☆223Updated last year
- Short checklists for penetration testing methodology☆195Updated 2 years ago
- OSCP Privilege Escalation MindMap/Guide☆197Updated 3 years ago
- Automatic Service Enumeration Script☆226Updated 2 years ago
- ☆138Updated 4 years ago
- Local penetration testing lab using docker-compose.☆202Updated 3 months ago
- A collection of personal scripts used in hacking excercises.☆153Updated 4 years ago
- Combination of all my Resources, Links & Scripts☆280Updated 6 years ago
- A LateX template for penetration testing reports☆106Updated 6 years ago
- It is a compilation of some resources for preparing for OSCP.☆203Updated 3 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆191Updated last year
- List of red team resources☆97Updated 7 years ago
- Writeups for the machines on ethical hacking site Hack the Box☆247Updated 3 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆222Updated 3 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆168Updated 4 years ago
- My OSCP journey☆159Updated 3 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆144Updated 2 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- This cheatsheet is aimed at the Red Teamers to help them understand the fundamentals of Credential Dumping (Sub Technique of Credential A…☆480Updated 5 months ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆60Updated 6 years ago