nickapic / Cyber-Security-Knowledge
A Project where I try to learn something new every day, and this is a place to track it
☆17Updated 3 years ago
Alternatives and similar repositories for Cyber-Security-Knowledge:
Users that are interested in Cyber-Security-Knowledge are comparing it to the libraries listed below
- Notes on ECPPT☆23Updated 6 years ago
- Template used for my OSCP exam.☆28Updated 2 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Updated 4 years ago
- A curated list of different pentesting resources☆29Updated 3 years ago
- ☆27Updated 5 years ago
- ☆21Updated 2 years ago
- An Automation Tool Written in Python which uses Twitter and GitHub API☆16Updated 3 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 5 years ago
- ☆29Updated 3 years ago
- ☆73Updated 3 years ago
- OSCP tools and notes☆41Updated 6 years ago
- High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your o…☆98Updated 2 years ago
- ☆31Updated 3 years ago
- This repository contains all the Talk slides that I have given at various security conferences, events & meetups.☆34Updated 4 years ago
- ☆22Updated 3 years ago
- Buffer Overflows☆29Updated 4 years ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 3 years ago
- PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array …☆55Updated 3 years ago
- You don't need wires to be connected☆40Updated 4 years ago
- AWS S3 open bucket poc automated script.☆57Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆79Updated 4 years ago
- ☆13Updated 3 years ago
- ☆29Updated 3 years ago
- A collection of lab reports of the Penetration Testing Student course by INE which prepares you for the eJPT.☆46Updated 3 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15Updated 3 months ago
- Notes from OSCP, CTF, security adventures, etc...☆58Updated last year
- ☆23Updated 3 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated 3 years ago
- ☆18Updated 2 years ago
- ☆20Updated 2 years ago