Skills To Improve Before Heading to OSCP
☆15May 14, 2017Updated 8 years ago
Alternatives and similar repositories for OSCP-Skills
Users that are interested in OSCP-Skills are comparing it to the libraries listed below
Sorting:
- ☆13Sep 21, 2017Updated 8 years ago
- My learning guide for preparation of the CISSP exam☆13Apr 8, 2015Updated 10 years ago
- Scripts to control an "OSCP-like" lab environment.☆23Aug 14, 2017Updated 8 years ago
- My OSCP report template in LaTex☆25Jan 31, 2020Updated 6 years ago
- Black Hat Python for Pentesters & Hackers, published by Packt☆26Jan 18, 2021Updated 5 years ago
- CSV injection Vulnerable Script.☆29Jun 19, 2017Updated 8 years ago
- A HTTP bot in Java with basic commands and ability's☆10Aug 20, 2015Updated 10 years ago
- Empower your enumeration during OSCP☆36Dec 7, 2018Updated 7 years ago
- A modular framework designed to chain and automate security tests.☆44Jan 6, 2021Updated 5 years ago
- Generate Multiple Nessus Activation Code using Temp Mail Service.☆29Dec 8, 2017Updated 8 years ago
- Tareas y plazos para los alumnos de 1º DAM del IES Campanillas del curso 2019/2020 en la asignatura de Programación.☆10Jun 1, 2020Updated 5 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!☆10Sep 8, 2021Updated 4 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Updated this week
- ☆13Oct 10, 2018Updated 7 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Just a vault template to help someone on the certificate.☆12Sep 3, 2025Updated 6 months ago
- cve-2025-24813验证脚本☆11Mar 14, 2025Updated 11 months ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 6 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Asynchronous public DNS auditing tool☆11May 22, 2023Updated 2 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 7 months ago
- ☆12Jul 15, 2018Updated 7 years ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- نمونه سوالات و پاسخ های مصاحبه تست نفوذ برنامه های موبایل