These are the checklists I used during each phase of my CPTS Exam.
☆47Jun 7, 2025Updated 10 months ago
Alternatives and similar repositories for CPTS-Checklists
Users that are interested in CPTS-Checklists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Comprehensive notes, cheatsheets, and practical techniques for penetration testing and red teaming.☆165Apr 25, 2026Updated last week
- Advanced Penetration Testing Framework | Powered by Bash☆32Oct 31, 2024Updated last year
- ☆14Nov 16, 2024Updated last year
- The source to a imageboard by the name of 4chan that suffered a brutal fate to the altchan "soyjak.party". This will NOT run on anything …☆14Apr 17, 2025Updated last year
- Utilizing DLang For Offensive Operations.☆15May 29, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Sep 8, 2021Updated 4 years ago
- HHousen's writeups to various HackTheBox machines and challenges from https://hackthebox.com.☆22Mar 3, 2023Updated 3 years ago
- A collection of study notes and resources for the Offensive Security Certified Professional (OSCP) certification exam. Includes summaries…☆66Nov 15, 2025Updated 5 months ago
- ☆13Apr 26, 2025Updated last year
- Pentest scriptkit for your copypasta☆14Feb 18, 2026Updated 2 months ago
- Google Dorking Payloads☆12Jun 24, 2024Updated last year
- Free cybersecurity training resources☆13Feb 5, 2020Updated 6 years ago
- Packet Analysis on Steroids☆14Oct 20, 2022Updated 3 years ago
- The most autonomous pentesting AI on the market. MCP server + Python agents with 150+ security tools, exploit chaining, and PoC validatio…☆145Updated this week
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆16Dec 4, 2023Updated 2 years ago
- This guide leverages QEMU on unix to capture and analyze PCIE devices☆26Mar 8, 2026Updated last month
- Ease and assist the compromise of an Active Directory environment.☆31Sep 17, 2021Updated 4 years ago
- Playing with ISO 15693 emulation☆14Dec 25, 2024Updated last year
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆22Aug 2, 2025Updated 8 months ago
- Tips and Tricks for OSCP and Beyond!☆26Dec 9, 2023Updated 2 years ago
- Hashcat wrapper for attack chain automation and enhanced wordlist generation☆32Sep 15, 2025Updated 7 months ago
- e2e Scanning research module☆25Mar 26, 2026Updated last month
- All key information of each module and more of Hackthebox Academy CPTS job role path. Solutions and walkthroughs for each question and ea…☆46Apr 22, 2026Updated last week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- just a buncha stuff i made☆12Oct 1, 2023Updated 2 years ago
- G-MAIL BRUTE FORCE HACK☆14Sep 14, 2022Updated 3 years ago
- A customized version of spacehuhns Deauther for the esp8266 Wifi module. This folder contains the modified Deauther itself long with 3d o…☆12Jan 27, 2020Updated 6 years ago
- Library to manipulate drivers that expose a physical memory read/write primitive.☆47Sep 4, 2023Updated 2 years ago
- Binary Exploitation Phrack CTF Challenge☆71Aug 21, 2025Updated 8 months ago
- Manage attack surface data on Elasticsearch☆26Nov 20, 2023Updated 2 years ago
- Notes for OSCP & CPTS.☆83Apr 21, 2026Updated last week
- All the latest Azure updates are centralised in one repository.☆16Apr 25, 2026Updated last week
- Enumeration Guide☆45Dec 30, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- View Interrupt types and info on how many are fired. Can view reasons for gummy bear checks. Credits to ekknod for the original drvscan.☆32Apr 21, 2025Updated last year
- File-Upload-XSS is a Python script that exploits the SVG XSS vulnerability in file upload services to gather information about users visi…☆18Jan 15, 2023Updated 3 years ago
- useful stuff for pentesting☆54Mar 18, 2025Updated last year
- FPGA card looks like an sata/ata controller, but hides inside pcileech-fpga researching tool. (ASM1061/ASM1062 Serial ATA Controller)☆41May 27, 2025Updated 11 months ago
- The classic launcher, evolved. Fast, Go-based command library equipped with 200+ cybersecurity cheat-sheets. Just install and start hacki…☆123Apr 9, 2026Updated 3 weeks ago
- First Prize in HackJaipur Hackathon 2020 for Best ElasticSearch-based Product! Website: http://coronaxiv2.surge.sh/#/☆16Jul 25, 2023Updated 2 years ago
- Every Hacker's Go to Fuzzing List. Introducing the Ultimate Fuzzing Directory: Your Go-To Resource for Penetration Testers and Bug Bounty…☆25Jan 13, 2024Updated 2 years ago