OSCP cheatsheet
☆105Jan 11, 2024Updated 2 years ago
Alternatives and similar repositories for OSCP
Users that are interested in OSCP are comparing it to the libraries listed below
Sorting:
- Notes from OSCP, CTF, security adventures, etc...☆64Feb 6, 2024Updated 2 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- ☆21Aug 28, 2022Updated 3 years ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 6 years ago
- In this repo I collect all commands, links, techniques and tricks i found during my work as pentester, hacker, OSCP student and hack the …☆64Dec 21, 2020Updated 5 years ago
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆19Feb 29, 2020Updated 6 years ago
- ☆19Jul 23, 2021Updated 4 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 4 years ago
- This is a collection of resources, scripts, bookmarks, writeups, notes, cheatsheets that will help you in OSCP Preparation as well as for…☆226Oct 3, 2020Updated 5 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- My OSCP notes☆225Jul 17, 2024Updated last year
- ☆177Nov 21, 2020Updated 5 years ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- A collection of tools, notes, & resources I've created during my OSCP certification journey.☆10Apr 25, 2021Updated 4 years ago
- ☆10Jun 11, 2022Updated 3 years ago
- ☆12Sep 23, 2023Updated 2 years ago
- ☆24Feb 7, 2025Updated last year
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆109Dec 13, 2022Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- ☆145Jul 25, 2022Updated 3 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆14Nov 30, 2021Updated 4 years ago
- ☆15Jan 4, 2021Updated 5 years ago
- ☆18Nov 24, 2020Updated 5 years ago
- Vuls Beater for Elasticsearch - connecting vuls☆17Dec 15, 2020Updated 5 years ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- XSS scanner that detects Cross-Site Scripting vulnerabilities in website by injecting malicious scripts☆128Aug 9, 2020Updated 5 years ago
- Windows 10 Live Information viewer☆38Jan 27, 2022Updated 4 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆31Mar 30, 2020Updated 5 years ago
- ☆32Aug 12, 2021Updated 4 years ago
- A powerful Burp extension to make bounty rain☆14Feb 1, 2022Updated 4 years ago
- HOCXSS (Cross Site Scripting)☆12May 7, 2020Updated 5 years ago
- Pentesting Mobile apps and resources www.sniferl4bs.com☆39Jul 10, 2021Updated 4 years ago
- ☆138Apr 20, 2023Updated 2 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14May 29, 2021Updated 4 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- An Ansible role to install cobalt-strike☆16Aug 24, 2020Updated 5 years ago
- A command-line application to generate random user agent strings.☆17Mar 20, 2020Updated 5 years ago