I have created this dashboard to track oscp preparation. I have used several resources and has been mentioned in dashboard. Tjnull's blog and machine list was basic inspiration for dashboard.
☆13Jul 8, 2022Updated 3 years ago
Alternatives and similar repositories for oscp-dashboard
Users that are interested in oscp-dashboard are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- OSCP Exam Report Template in Markdown☆11Jan 14, 2021Updated 5 years ago
- Python framework for collecting and analyzing TLS certificate data via the Certificate Transparency Network☆12May 25, 2025Updated 11 months ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- Upgrading jsleak with a CI/CD and new rules☆17May 6, 2023Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- CLI tool for filtering URLs/IPs with automatically-updated Bug Bounty program scope rules.☆36Dec 31, 2025Updated 4 months ago
- CVE-2023-20198 Checkscript☆20Oct 23, 2023Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Dec 23, 2020Updated 5 years ago
- OASIS-TAC-TC: OWL representation of the TAC TCs work products are maintained here. - https://github.com/oasis-tcs/tac-ontology☆17Oct 27, 2021Updated 4 years ago
- 🔭 Kubernetes out-cluster vulnerability scanner☆20Jul 14, 2021Updated 4 years ago
- Unencrypted is my blogpage which features some blogs and writeups related to IT.☆10Apr 2, 2024Updated 2 years ago
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- Random Password Generator built with Next.js and JavaScript☆13Dec 14, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆17Aug 29, 2022Updated 3 years ago
- A collection of lab reports of the Penetration Testing Student course by INE which prepares you for the eJPT.☆49Jun 27, 2021Updated 4 years ago
- 🕸️ A curated list of dark web (.onion) links — for educational and research purposes only.☆44Sep 21, 2025Updated 8 months ago
- Guide to SSRF☆79Oct 10, 2023Updated 2 years ago
- A generic sysreptor template to write on-premise related Altered Security's certifications reports of compromission.☆26Aug 17, 2025Updated 9 months ago
- ☆17Aug 5, 2025Updated 9 months ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- a short, AI-powered python script to look for all the naughty words you've ever used on twitter.com (best if used before you wreck yoself…☆13Apr 15, 2020Updated 6 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆46Jan 22, 2025Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- [Mirror] thc.org uses a CA that is not trusted on a base Arch system so we are mirroring some source here.☆15Nov 9, 2013Updated 12 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated 2 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆54Jul 15, 2023Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- regex Hunter- Fast website endpoint sensitive data and Leaks JS files endpoint API Key Scraper☆13Jun 8, 2024Updated last year
- Find nearby Pokéstops☆21May 22, 2023Updated 3 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- Data of paper "CTF: Anomaly Detection in High-Dimensional Time Series with Coarse-to-Fine Model Transfer"☆14Jan 11, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Importing data from Sbanken to YNAB using Sbanken API and python 3☆26Feb 17, 2024Updated 2 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- CommandInWiFi: Exploiting SSID Storage in WiFi Scanning for Command Injection☆41Updated this week
- ☆58Jun 18, 2023Updated 2 years ago