mttaggart / pwst-resourcesView external linksLinks
Resources for Students in the Practical Webapp Security and Testing course
☆168Jun 27, 2023Updated 2 years ago
Alternatives and similar repositories for pwst-resources
Users that are interested in pwst-resources are comparing it to the libraries listed below
Sorting:
- Resources for Students in the Practical Webapp Security and Testing course☆22Oct 15, 2025Updated 4 months ago
- Compilation of Resources for TCM's Linux Privilege Escalation course☆581Oct 23, 2020Updated 5 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- Proof of Concept for CVE-2019-18634☆233Sep 12, 2021Updated 4 years ago
- Labs for Practical Malware Analysis & Triage☆1,076Dec 20, 2025Updated last month
- Compilation of Resources from TCM's Windows Priv Esc Udemy Course☆793Oct 23, 2020Updated 5 years ago
- My attempt at weaponizing Discord.☆18Apr 13, 2022Updated 3 years ago
- Sample pentest report provided by TCM Security☆1,324Mar 18, 2022Updated 3 years ago
- Dev_Display 💻🚀 An awesome Portfolio template to showcase your skills , works & p…☆19Nov 17, 2023Updated 2 years ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆294Jan 1, 2022Updated 4 years ago
- Kali Linux Fixes for Newly Imported VM's☆2,392Jun 30, 2025Updated 7 months ago
- A tool for parsing breached passwords☆2,089Mar 21, 2024Updated last year
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 6 months ago
- Modules for my C2 course students to use for their own projects.☆74Jun 13, 2023Updated 2 years ago
- ☆43Oct 28, 2021Updated 4 years ago
- Practice Labs☆104Dec 10, 2020Updated 5 years ago
- API Penetration Testing Notes☆16Sep 25, 2025Updated 4 months ago
- ☆13Nov 17, 2021Updated 4 years ago
- Template project for Offensive Security Exam Documentation☆11Feb 25, 2020Updated 5 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 10 months ago
- ☆68Jun 8, 2023Updated 2 years ago
- OSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines☆1,071Jan 25, 2026Updated 3 weeks ago
- Harness the Power of AI for all your reporting needs.☆28Apr 17, 2023Updated 2 years ago
- Resources for TCM Security Linux 101 course☆313Jul 4, 2023Updated 2 years ago
- Web recon script. No need to fear, sumrecon is here!☆393Oct 10, 2022Updated 3 years ago
- ☆211Mar 4, 2022Updated 3 years ago
- A very opinionated list of security tools☆128Mar 21, 2025Updated 10 months ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 5 years ago
- My Notes about Penetration Testing☆728Jan 17, 2026Updated 3 weeks ago
- ☆60Sep 28, 2022Updated 3 years ago
- A powerful tool to scan CRLF vulnerability written in Python☆15Oct 31, 2023Updated 2 years ago
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆239Dec 4, 2022Updated 3 years ago
- ☆34May 24, 2023Updated 2 years ago
- My experiences with Virtual Hacking Labs☆12Feb 7, 2020Updated 6 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- This is my journey into CTF, from my introduction into ethical hacking, covering the tools and competitions that I now engage with and th…☆14Sep 29, 2025Updated 4 months ago
- The labs for my Udemy course (https://www.udemy.com/course/intro-to-bug-bounty-by-nahamsec)☆470May 20, 2023Updated 2 years ago
- ☆717Aug 8, 2025Updated 6 months ago