Resources for Students in the Practical Webapp Security and Testing course
☆168Jun 27, 2023Updated 2 years ago
Alternatives and similar repositories for pwst-resources
Users that are interested in pwst-resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Resources for Students in the Practical Webapp Security and Testing course☆23Oct 15, 2025Updated 5 months ago
- Compilation of Resources for TCM's Linux Privilege Escalation course☆582Oct 23, 2020Updated 5 years ago
- Dev_Display 💻🚀 An awesome Portfolio template to showcase your skills , works & p…☆19Nov 17, 2023Updated 2 years ago
- My attempt at weaponizing Discord.☆18Apr 13, 2022Updated 3 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Labs for Practical Malware Analysis & Triage☆1,098Mar 23, 2026Updated last week
- Proof of Concept for CVE-2019-18634☆237Sep 12, 2021Updated 4 years ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆799Oct 23, 2020Updated 5 years ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 7 months ago
- ☆14Mar 26, 2024Updated 2 years ago
- Sample pentest report provided by TCM Security☆1,344Mar 18, 2022Updated 4 years ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆293Jan 1, 2022Updated 4 years ago
- Template project for Offensive Security Exam Documentation☆12Feb 25, 2020Updated 6 years ago
- Are you able to use open source intelligence to solve this challenge?☆11Apr 14, 2019Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- A tool for parsing breached passwords☆2,096Mar 21, 2024Updated 2 years ago
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- Optimized WordLists for Pentesting☆16Feb 6, 2020Updated 6 years ago
- A powerful tool to scan CRLF vulnerability written in Python☆15Oct 31, 2023Updated 2 years ago
- ☆13Nov 17, 2021Updated 4 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆219Dec 28, 2022Updated 3 years ago
- ☆69Jun 8, 2023Updated 2 years ago
- Kali Linux Fixes for Newly Imported VM's☆2,404Jun 30, 2025Updated 9 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- My experiences with Virtual Hacking Labs☆12Feb 7, 2020Updated 6 years ago
- A very opinionated list of security tools☆128Mar 21, 2025Updated last year
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- ☆43Oct 28, 2021Updated 4 years ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- OSCP Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines☆1,074Updated this week
- ☆212Mar 4, 2022Updated 4 years ago
- ☆35Apr 6, 2024Updated last year
- This is my journey into CTF, from my introduction into ethical hacking, covering the tools and competitions that I now engage with and th…☆14Feb 26, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Practice Labs☆104Dec 10, 2020Updated 5 years ago
- SQLi Labs by Audi-1 updated to work on kali 2.0.☆13Aug 16, 2019Updated 6 years ago
- ☆61Sep 28, 2022Updated 3 years ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Jun 19, 2024Updated last year
- This is poc of CVE-2022-46169 authentication bypass and remote code execution☆15May 18, 2023Updated 2 years ago
- My Notes about Penetration Testing☆731Jan 17, 2026Updated 2 months ago
- A tool designed to extract data from a logical ReFS 3.4 forensic image produced by FTK Imager☆16Nov 22, 2023Updated 2 years ago