OSCP Methodology
☆57Sep 6, 2023Updated 2 years ago
Alternatives and similar repositories for OSCP-Methodology
Users that are interested in OSCP-Methodology are comparing it to the libraries listed below
Sorting:
- Custom mini tools during Red Teaming engagements☆23Jan 20, 2026Updated last month
- ☆42Dec 24, 2024Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- ☆12Aug 22, 2017Updated 8 years ago
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- A script that parses nmap.xml output, identifies all SSL services and automatically performs an sslscan of each service☆14Jul 2, 2025Updated 8 months ago
- ☆13Sep 8, 2024Updated last year
- An open-source knowledge base for security researchers.☆17Jan 8, 2025Updated last year
- ☆11Dec 17, 2023Updated 2 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- ☆29May 16, 2023Updated 2 years ago
- Cobalt Strike random C2 Profile generator☆16Feb 23, 2026Updated last week
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 3 months ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆21Nov 28, 2025Updated 3 months ago
- Collected resources for OSWA preparation.☆26Jan 25, 2023Updated 3 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- ☆37Aug 8, 2021Updated 4 years ago
- Red Teaming & Active Directory Cheat Sheet.☆41Sep 21, 2023Updated 2 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆27Dec 20, 2025Updated 2 months ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆18Jan 22, 2025Updated last year
- Prototype Pollution Lab☆19Nov 20, 2020Updated 5 years ago
- Awesome Privilege Escalation☆145Oct 18, 2022Updated 3 years ago
- Python Penetration Testing Tools☆17Jul 19, 2025Updated 7 months ago
- ☆40Jan 12, 2022Updated 4 years ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 10 months ago
- Commands, snippets, exploits, tools, lists, collections and techniques I used on my journey to becoming an OSCP.☆306Mar 10, 2021Updated 4 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 4 months ago
- A Burp Suite extension to add a custom header (e.g. JWT)☆20Dec 9, 2021Updated 4 years ago
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆55Apr 27, 2023Updated 2 years ago
- Advanced Malware Analysis Tool using Radare2 and r2pipe☆49Updated this week
- A compilation of important commands, files, and tools used in Pentesting☆53Jan 17, 2023Updated 3 years ago
- Learning resources and external resources to help you prepare for your offsec certifications☆102Nov 1, 2024Updated last year
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Mar 1, 2019Updated 7 years ago
- CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42☆20Nov 21, 2019Updated 6 years ago
- ☆66Jul 12, 2025Updated 7 months ago