My notes while studying for the PNPT from TCM Security.
☆101Apr 24, 2024Updated last year
Alternatives and similar repositories for PNPT-study-guide
Users that are interested in PNPT-study-guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- My notes while studying for the PNPT from TCM Security.☆83Mar 30, 2024Updated 2 years ago
- Free Windows privilege escalation lab inspired by HTB Devel, built for PNPT and OSCP practice.☆23Jan 13, 2026Updated 3 months ago
- Cheatsheet from the PJPT course of TCM security.☆34Jan 15, 2024Updated 2 years ago
- ☆57Jun 18, 2023Updated 2 years ago
- A study resource for the BSCP labs and exams.☆35Aug 8, 2025Updated 8 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Notes in preparation for the PNPT (Practical Network Penetration Testing) Certification Exam☆63Apr 30, 2023Updated 2 years ago
- PNPT Exam Preparation - TCM Security☆172Jul 25, 2021Updated 4 years ago
- tools, files, and scripts I use for PNPT and CRTO☆24Feb 21, 2022Updated 4 years ago
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Apr 4, 2026Updated last week
- ☆14Sep 25, 2022Updated 3 years ago
- A simple index for HackTheBox machine along with tags☆16Mar 26, 2026Updated 3 weeks ago
- INE eJPT Cheat Sheet / Course Notes. You'll find my comprehensive course notes, which also serve as cheat sheets for the eJPTv2 course. T…☆104Aug 24, 2025Updated 7 months ago
- Welcome to RFS notes to CRTP - Certified Red Team Professional by Altered Security.☆22Aug 20, 2024Updated last year
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- OID-See is an identity attack surface mapping tool that models OAuth trust, persistence, and impersonation paths in Entra using a graph-b…☆35Mar 31, 2026Updated 2 weeks ago
- Made for My Personal Learning.☆33May 20, 2023Updated 2 years ago
- A warehouse for your malware☆20Feb 25, 2013Updated 13 years ago
- Custom config.☆20May 17, 2023Updated 2 years ago
- CUPP - Common User Passwords Profiler !☆15Jun 14, 2024Updated last year
- These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation☆18Oct 3, 2021Updated 4 years ago
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Jan 23, 2026Updated 2 months ago
- This project contains a **test executable** specifically designed to trigger incidents in **Microsoft Defender for Endpoint (MDE)**. It…☆14Jul 20, 2025Updated 8 months ago
- Generates a detailed CSV file containing Sigma Rules statistics for each service or category, and each level, offering a holistic view of…☆10Dec 22, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆30Jan 12, 2023Updated 3 years ago
- Malware Development Framework☆11Apr 13, 2024Updated 2 years ago
- Same Pentest Resume☆144Mar 12, 2020Updated 6 years ago
- A fun way to express your feelings if you are a programmer☆10Oct 25, 2022Updated 3 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://github…☆20Feb 9, 2021Updated 5 years ago
- Lateral Movement and Data Access artifacts for Velociraptor☆17Dec 2, 2025Updated 4 months ago
- ☆38Sep 28, 2023Updated 2 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Oct 30, 2021Updated 4 years ago
- A small security playground implementation of GHOSTS User Simulation framework with an Active Directory deployment and Elastic.☆20Jul 17, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆17Feb 20, 2020Updated 6 years ago
- Malware Development☆10Sep 30, 2020Updated 5 years ago
- Keyfob Analysis Tool☆62Mar 22, 2026Updated 3 weeks ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆19Mar 4, 2022Updated 4 years ago
- A program for cloning RFID, Sub-GHz, and infrared signals like Flipper Zero, but simpler.☆14May 10, 2024Updated last year
- INE/eLearnSecurity Certified Professional Penetration Tester (eCPPT) / PTP v2 and v3 Notes☆67Dec 28, 2024Updated last year
- Solution descriptions for all the problems on foreverCTF☆12Aug 12, 2024Updated last year