Skills To Improve Before Heading to OSCP
☆15May 14, 2017Updated 8 years ago
Alternatives and similar repositories for OSCP-Skills
Users that are interested in OSCP-Skills are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Sep 21, 2017Updated 8 years ago
- My learning guide for preparation of the CISSP exam☆13Apr 8, 2015Updated 10 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- Scripts to control an "OSCP-like" lab environment.☆23Aug 14, 2017Updated 8 years ago
- Writeups for the challenges i wrote for ASCWG quals☆10Aug 8, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- Hacking ZXHN H108N Router (brute-force)☆12Mar 21, 2019Updated 7 years ago
- CSV injection Vulnerable Script.☆29Jun 19, 2017Updated 8 years ago
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- Generate Multiple Nessus Activation Code using Temp Mail Service.☆29Dec 8, 2017Updated 8 years ago
- ☆12Jan 21, 2019Updated 7 years ago
- Pentoo installer rewritten by Wuodan to be more modular☆11Jan 9, 2026Updated 2 months ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 8 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Empower your enumeration during OSCP☆36Dec 7, 2018Updated 7 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- CVE-2018-11311 | mySCADA myPRO 7 Hardcoded FTP Username and Password Vulnerability☆12Jul 2, 2018Updated 7 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- salt state definitions for installing logstash, elasticsearch and kibana☆36Aug 6, 2013Updated 12 years ago
- Black Hat Python for Pentesters & Hackers, published by Packt☆26Jan 18, 2021Updated 5 years ago
- Firmware analysis website + API☆43Oct 1, 2020Updated 5 years ago
- ☆12Jul 15, 2018Updated 7 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Nessie Viewer enables IT Security auditors and penetration testers to quickly navigate through Nessus reports and Nmap XMLs☆17May 23, 2018Updated 7 years ago
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- Juniper Junos Space (CVE-2020-1611) (PoC)☆29Jan 22, 2020Updated 6 years ago
- Install popular tools used while pentesting & playing labs☆14Oct 8, 2021Updated 4 years ago
- [WIP] a simple UI for Vulhub☆16Jun 10, 2021Updated 4 years ago
- Notes of my OSCP study plan☆466Jun 29, 2022Updated 3 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- نمونه سوالات و پاسخ های مصاحبه تست نفوذ برنامه های موبایل☆15Aug 21, 2023Updated 2 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Feb 1, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Azure Databricks workshops with content on connectivity to Azure services, data engineering workflows and data sciences notebooks.☆11Feb 20, 2019Updated 7 years ago
- MiKey is a minimal and modular Linux keylogger. It provides a toolkit that monitors and records all activities performed on a computer. I…☆15Jan 29, 2014Updated 12 years ago
- GoLang File Examples☆13Nov 20, 2018Updated 7 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Sep 28, 2021Updated 4 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- A modular framework designed to chain and automate security tests.☆44Jan 6, 2021Updated 5 years ago