This repository outlines my OSCP-focused methodology, specifically targeting common port numbers encountered during penetration testing. The goal is to provide a structured approach to identifying potential attack vectors based on port-specific vulnerabilities/misconfigurations.
☆24Jul 21, 2021Updated 4 years ago
Alternatives and similar repositories for OSCP-Methodology
Users that are interested in OSCP-Methodology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- OSCP material tools and helpful scripts.☆14Mar 14, 2025Updated last year
- OSCP Preperation☆14Aug 12, 2021Updated 4 years ago
- Get 10k subdomains in securitytrails using cookie without apikey.☆37Oct 23, 2025Updated 5 months ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆21Jun 9, 2019Updated 6 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆13Aug 14, 2020Updated 5 years ago
- A simple password cracker written in Go, designed to search for a specific hashed password in a wordlist.☆13Feb 23, 2024Updated 2 years ago
- Compiled binaries of various security tools☆14May 19, 2021Updated 4 years ago
- ☆21Jan 2, 2026Updated 2 months ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- PowerShell based network attached device monitor☆11Sep 3, 2024Updated last year
- Materials for my PS Automation Workshop☆14Jun 9, 2021Updated 4 years ago
- Proof of concept to see if more modern HTML reports can be made with PowerShell