jbarone / penlab
Penetration Testing Lab
☆25Updated 10 years ago
Alternatives and similar repositories for penlab:
Users that are interested in penlab are comparing it to the libraries listed below
- Script to manage and create local pentesting training virtual lab☆48Updated 4 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆90Updated last year
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆18Updated 6 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- ☆24Updated 5 years ago
- ☆17Updated 3 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆52Updated 3 years ago
- ☆43Updated 8 years ago
- Damn Vulnerable Rails app☆12Updated 12 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago
- ☆14Updated 4 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- Privilege Escalation MindMap☆15Updated 4 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆42Updated 4 years ago
- MayorSec DNS Enumeration Tool☆85Updated 4 months ago
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆33Updated 7 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Updated 5 years ago
- ☆34Updated last year
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆26Updated 4 years ago
- ☆12Updated 3 years ago
- Damn Vulnerable WordPress Site☆51Updated 2 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆62Updated 5 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 5 years ago
- ☆32Updated last year
- Buffer Overflows☆29Updated 4 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- OSWE Preparation☆37Updated 5 years ago
- ☆28Updated 4 years ago
- Python for Defenders Course Resources☆16Updated last year