pentestfunctions / WSL-Seamless
Seamless mode integration for WSL
☆11Updated last year
Alternatives and similar repositories for WSL-Seamless:
Users that are interested in WSL-Seamless are comparing it to the libraries listed below
- Remake of CVE-2020-9484 by Pentestical☆19Updated 6 months ago
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆70Updated last year
- Bookmarklet to find endpoints easily with one click☆51Updated 10 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆242Updated 6 months ago
- Obsidian Templates for OSCP, CPTS, and Training labs☆83Updated last month
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆292Updated last week
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆166Updated last year
- notes and ramblings from my OSCP/PenTesting Studies☆81Updated last year
- Scripts for offensive security☆109Updated 3 weeks ago
- Simple HTTP listener for security testing☆113Updated 4 months ago
- My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.☆113Updated 2 weeks ago
- my notes☆195Updated 3 months ago
- Red Team Toolkit - A curated list of tools that are commonly used in the field for Physical Security, Red Teaming, and Tactical Covert En…☆500Updated 10 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆358Updated last year
- Certified Red Team Operator☆409Updated 2 years ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆273Updated 2 weeks ago
- A collection of config files for linux focusing on hackthebox theme☆43Updated 3 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated 10 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆368Updated 2 months ago
- OWASP based Web Application Security Testing Checklist☆71Updated 8 months ago
- ☆83Updated last year
- All knowledge I gained from CTFs, real life penetration testing and learning by myself.☆133Updated last month
- ☆447Updated 2 weeks ago
- Shodan Dorks 2023☆231Updated 2 months ago
- A blind SQL injection brute forcer☆108Updated 4 months ago
- improving...☆173Updated 2 months ago
- My notes while studying for the PNPT from TCM Security.☆62Updated last year
- TryHackMe rooms, tips and tricks, and other CTF writeups☆122Updated 3 months ago
- ☆266Updated last year
- A RedTeam Toolkit☆394Updated this week