Resources for Students in the Practical Webapp Security and Testing course
☆169Jun 27, 2023Updated 2 years ago
Alternatives and similar repositories for pwst-resources
Users that are interested in pwst-resources are comparing it to the libraries listed below
Sorting:
- Resources for Students in the Practical Webapp Security and Testing course☆23Oct 15, 2025Updated 4 months ago
- Compilation of Resources for TCM's Linux Privilege Escalation course☆583Oct 23, 2020Updated 5 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- Proof of Concept for CVE-2019-18634☆237Sep 12, 2021Updated 4 years ago
- Labs for Practical Malware Analysis & Triage☆1,084Feb 23, 2026Updated 2 weeks ago
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆798Oct 23, 2020Updated 5 years ago
- My attempt at weaponizing Discord.☆18Apr 13, 2022Updated 3 years ago
- Sample pentest report provided by TCM Security☆1,332Mar 18, 2022Updated 3 years ago
- Dev_Display 💻🚀 An awesome Portfolio template to showcase your skills , works & p…☆19Nov 17, 2023Updated 2 years ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆293Jan 1, 2022Updated 4 years ago
- Kali Linux Fixes for Newly Imported VM's☆2,396Jun 30, 2025Updated 8 months ago
- A tool for parsing breached passwords☆2,093Mar 21, 2024Updated last year
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 7 months ago
- Modules for my C2 course students to use for their own projects.☆73Jun 13, 2023Updated 2 years ago
- ☆43Oct 28, 2021Updated 4 years ago
- Practice Labs☆104Dec 10, 2020Updated 5 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- Template project for Offensive Security Exam Documentation☆11Feb 25, 2020Updated 6 years ago
- ☆13Nov 17, 2021Updated 4 years ago
- API Penetration Testing Notes☆16Sep 25, 2025Updated 5 months ago
- ☆69Jun 8, 2023Updated 2 years ago
- OSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines☆1,072Jan 25, 2026Updated last month
- A tool designed to extract data from a logical ReFS 3.4 forensic image produced by FTK Imager☆16Nov 22, 2023Updated 2 years ago
- Harness the Power of AI for all your reporting needs.☆28Apr 17, 2023Updated 2 years ago
- ☆14Mar 26, 2024Updated last year
- Resources for TCM Security Linux 101 course☆312Jul 4, 2023Updated 2 years ago
- ☆210Mar 4, 2022Updated 4 years ago
- Web recon script. No need to fear, sumrecon is here!☆398Oct 10, 2022Updated 3 years ago
- A very opinionated list of security tools☆128Mar 21, 2025Updated 11 months ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- My Notes about Penetration Testing☆730Jan 17, 2026Updated last month
- A powerful tool to scan CRLF vulnerability written in Python☆15Oct 31, 2023Updated 2 years ago
- ☆61Sep 28, 2022Updated 3 years ago
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆240Dec 4, 2022Updated 3 years ago
- ☆34May 24, 2023Updated 2 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- My experiences with Virtual Hacking Labs☆12Feb 7, 2020Updated 6 years ago
- This is my journey into CTF, from my introduction into ethical hacking, covering the tools and competitions that I now engage with and th…☆14Feb 26, 2026Updated last week