nop-tech / PentestingLinks
My Collection of exploits, reverse shells, scripts and more
☆14Updated 2 years ago
Alternatives and similar repositories for Pentesting
Users that are interested in Pentesting are comparing it to the libraries listed below
Sorting:
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 8 months ago
- ☆36Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Creating a Malicious Macro using MS Word☆23Updated 3 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- Custom config.☆19Updated 2 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆18Updated last year
- ☆24Updated 7 months ago
- Offensive Security OSWE Prep 2022☆74Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- ☆36Updated 3 years ago
- Crackmapexec custom scripts used in my internal pentests.☆24Updated last year
- ☆15Updated last year
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Updated 10 months ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆14Updated 9 months ago
- ☆42Updated 2 years ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆38Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆53Updated 6 months ago
- Used to get NTLMv2 Hashes from SMB☆15Updated 8 months ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆75Updated last year
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 3 years ago
- JWT Auditor – Analyze, break, and understand your tokens like a pro.☆49Updated last week
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Updated last year
- This repository contains 0 click exploits to some HackTheBox machines, I used it to study for OSWE☆38Updated last year
- #cheat sheet for OSWP☆8Updated 4 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Updated 5 months ago
- Learning resources and external resources to help you prepare for your offsec certifications☆83Updated 8 months ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆17Updated 6 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year