your offsec knowledge
☆485Oct 9, 2019Updated 6 years ago
Alternatives and similar repositories for offsec_pdfs
Users that are interested in offsec_pdfs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆22Jun 28, 2016Updated 9 years ago
- offsec batteries included☆1,606Mar 11, 2024Updated 2 years ago
- Penetration Testing/Security Cheatsheets☆65Oct 31, 2015Updated 10 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Use Tor for anonymous scanning with nmap☆93Jun 19, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- devops scripts☆33Dec 8, 2016Updated 9 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- home! sweet home☆25Aug 23, 2019Updated 6 years ago
- just for fun ¯\_(ツ)_/¯☆278Sep 21, 2016Updated 9 years ago
- openvpn server configs☆15May 12, 2016Updated 9 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆18Aug 2, 2021Updated 4 years ago
- only for 31337☆24Nov 19, 2016Updated 9 years ago
- intrusion detection☆26Jun 14, 2017Updated 8 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Wiki to collect Red Team infrastructure hardening resources☆4,463Oct 1, 2025Updated 5 months ago
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,202Sep 29, 2025Updated 5 months ago
- Collection of linux sysadmin/devop interview questions☆18Aug 21, 2015Updated 10 years ago
- List of Awesome Red Teaming Resources☆7,834Dec 28, 2023Updated 2 years ago
- Tool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.☆63Feb 26, 2019Updated 7 years ago
- Machine Learning for Cyber Security☆8,315Aug 19, 2024Updated last year
- Red Team Tips as posted by @vysecurity on Twitter☆1,115Apr 26, 2020Updated 5 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆2,735Jun 22, 2020Updated 5 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆510May 27, 2018Updated 7 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- List of awesome penetration testing resources, tools and other shiny things☆2,731Oct 18, 2023Updated 2 years ago
- Notes of my OSCP study plan☆466Jun 29, 2022Updated 3 years ago
- Cheat sheets for various projects.☆1,086Oct 16, 2017Updated 8 years ago
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,475Dec 12, 2024Updated last year
- Collection of things made during my OSCP journey☆954Feb 24, 2022Updated 4 years ago
- A curated list of amazingly awesome OSINT☆25,414Mar 19, 2026Updated last week
- ☆1,396Apr 25, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,624Jan 23, 2024Updated 2 years ago
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,926Oct 20, 2025Updated 5 months ago
- interact with HackTheBox from your terminal☆24Jul 24, 2019Updated 6 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,805Jul 29, 2025Updated 7 months ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,188Dec 11, 2022Updated 3 years ago