I have created this dashboard to track oscp preparation. I have used several resources and has been mentioned in dashboard. Tjnull's blog and machine list was basic inspiration for dashboard.
☆13Jul 8, 2022Updated 3 years ago
Alternatives and similar repositories for oscp-dashboard
Users that are interested in oscp-dashboard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- OSCP Exam Report Template in Markdown☆11Jan 14, 2021Updated 5 years ago
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 9 months ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Upgrading jsleak with a CI/CD and new rules☆17May 6, 2023Updated 2 years ago
- CLI tool for filtering URLs/IPs with automatically-updated Bug Bounty program scope rules.☆35Dec 31, 2025Updated 2 months ago
- CVE-2023-20198 Checkscript☆20Oct 23, 2023Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Dec 23, 2020Updated 5 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆16Oct 27, 2021Updated 4 years ago
- 🔭 Kubernetes out-cluster vulnerability scanner☆20Jul 14, 2021Updated 4 years ago
- Unencrypted is my blogpage which features some blogs and writeups related to IT.☆10Apr 2, 2024Updated last year
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- 🕸️ A curated list of dark web (.onion) links — for educational and research purposes only. You can buy and read the Dark Web book based…☆39Sep 21, 2025Updated 6 months ago
- Random Password Generator built with Next.js and JavaScript☆13Dec 14, 2021Updated 4 years ago
- ☆17Aug 29, 2022Updated 3 years ago
- A collection of lab reports of the Penetration Testing Student course by INE which prepares you for the eJPT.☆51Jun 27, 2021Updated 4 years ago
- Guide to SSRF☆74Oct 10, 2023Updated 2 years ago
- A generic sysreptor template to write on-premise related Altered Security's certifications reports of compromission.☆24Aug 17, 2025Updated 7 months ago
- ☆15Aug 5, 2025Updated 7 months ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- a short, AI-powered python script to look for all the naughty words you've ever used on twitter.com (best if used before you wreck yoself…☆13Apr 15, 2020Updated 5 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆46Jan 22, 2025Updated last year
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆15Nov 9, 2013Updated 12 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆52Jul 15, 2023Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆12Jun 8, 2024Updated last year
- Find nearby Pokéstops☆21May 22, 2023Updated 2 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Data of paper "CTF: Anomaly Detection in High-Dimensional Time Series with Coarse-to-Fine Model Transfer"☆14Jan 11, 2021Updated 5 years ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Importing data from Sbanken to YNAB using Sbanken API and python 3☆26Feb 17, 2024Updated 2 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- CommandInWiFi: Exploiting SSID Storage in WiFi Scanning for Command Injection☆36Mar 9, 2026Updated 2 weeks ago
- Information gathering tool using OSINT and AI☆17Nov 21, 2024Updated last year