iamrajivd / pentestLinks
☆176Updated 5 years ago
Alternatives and similar repositories for pentest
Users that are interested in pentest are comparing it to the libraries listed below
Sorting:
- OSCP cheatsheet☆107Updated last year
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆247Updated 5 months ago
- My OSCP journey☆160Updated 3 years ago
- My OSCP notes☆225Updated last year
- Awesome note-taking apps for hackers & pentesters !☆378Updated 4 years ago
- Opening the door, one reverse shell at a time☆184Updated 4 years ago
- A collection of personal scripts used in hacking excercises.☆152Updated 5 years ago
- A random set of 5 machines for OSCP☆167Updated 5 years ago
- It is a compilation of some resources for preparing for OSCP.☆204Updated 3 years ago
- Local penetration testing lab using docker-compose.☆205Updated 5 months ago
- Writeups for the machines on ethical hacking site Hack the Box☆248Updated 3 years ago
- ☆76Updated 4 years ago
- OSCP Privilege Escalation MindMap/Guide☆198Updated 3 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆63Updated 6 years ago
- A collection of resources I'm using while working toward the OSCP☆78Updated 3 years ago
- Automatic Service Enumeration Script☆227Updated 3 years ago
- Active Directory Cheat Sheet☆143Updated 4 years ago
- Short checklists for penetration testing methodology☆197Updated 2 years ago
- Markdown reporting templates and Pandoc styling references to generate sleek reports for OSCP/PWK with little effort.☆206Updated 4 years ago
- Tips for Penetration Testing☆134Updated 2 years ago
- This is a collection of resources, scripts, bookmarks, writeups, notes, cheatsheets that will help you in OSCP Preparation as well as for…☆224Updated 5 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆166Updated 3 months ago
- ☆138Updated 4 years ago
- Web Application Security Testing Tools☆250Updated last year
- ☆145Updated 5 years ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.☆468Updated 3 years ago
- ☆100Updated 5 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆241Updated 5 years ago
- A LateX template for penetration testing reports☆106Updated 6 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 4 years ago