pascalschulz / Infosec-ResourcesLinks
just a little treasure chest of stuff I need to watch / read later
☆32Updated 4 years ago
Alternatives and similar repositories for Infosec-Resources
Users that are interested in Infosec-Resources are comparing it to the libraries listed below
Sorting:
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 6 years ago
- Script to manage and create local pentesting training virtual lab☆49Updated 5 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆43Updated 4 years ago
- Getting FREE Cyber Security Resources have been a challenge always. Access Davy-Jones-Locker to get all what you might need to upskill yo…☆58Updated 4 years ago
- MayorSec DNS Enumeration Tool☆87Updated 6 months ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- ☆31Updated 3 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Updated 5 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆50Updated 4 years ago
- ☆29Updated 3 years ago
- Notes on ECPPT☆22Updated 6 years ago
- ☆32Updated last year
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 3 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago
- ☆17Updated 4 years ago
- A curated list of different pentesting resources☆29Updated 3 years ago
- ☆14Updated 4 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆53Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆62Updated 5 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated 3 weeks ago
- ☆13Updated 5 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆92Updated 2 years ago
- ☆18Updated 2 years ago
- ☆63Updated 4 years ago
- ☆48Updated 3 years ago
- Cheat-Sheet of tools for penetration testing☆54Updated 2 years ago
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- ☆75Updated 3 years ago
- ☆17Updated last year
- ☆46Updated 4 years ago