psmitty7373 / copLinks
Web-based Collaborative Common Operating Picture Tool (COP)
☆26Updated 4 years ago
Alternatives and similar repositories for cop
Users that are interested in cop are comparing it to the libraries listed below
Sorting:
- Example reports from prior years of the Collegiate Penetration Testing Competition☆152Updated 2 months ago
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆100Updated 4 years ago
- Infrastructure Automation☆355Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆221Updated 3 years ago
- ☆27Updated 5 years ago
- [S]imple [T]actical [A]gent [R]elay: A peer-to-peer C2-ish framework for Ethical Hackers and Security Researchers.☆31Updated 3 years ago
- Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit☆169Updated last week
- ☆48Updated 3 years ago
- ☆200Updated 5 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 4 years ago
- Browser extension that extracts users from LinkedIn company pages☆161Updated 2 years ago
- My Password Cracking Methodology☆83Updated 2 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆144Updated 3 years ago
- A Google/Bing Scraping tool for LinkedIn☆93Updated 2 years ago
- A little utility to convert nmap xml results to markdown tables☆72Updated 3 years ago
- Suggests programs to run against services found during the enumeration phase of a Pentest☆113Updated last week
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 5 years ago
- A collection of Offensive Go packages.☆213Updated 3 years ago
- An arXiv for, what I think, are the finest in hacker works☆122Updated 10 months ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Updated 4 years ago
- Scripts featured in the book How to Hack Like a Legend☆147Updated 2 years ago
- ☆100Updated 11 months ago
- Python template to assist with buffer overflows☆72Updated 5 years ago
- OSCP Cheatsheets☆98Updated 6 years ago
- Test tool for CVE-2020-1472☆36Updated 2 years ago
- large hashcat rulesets generated from real-world compromised passwords☆398Updated 4 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆213Updated 2 years ago
- ☆35Updated 2 years ago
- My thoughts from going through the OSEP materials.☆21Updated 4 years ago
- Shell Please 1.0 : Reverse shell code generator.☆36Updated 3 years ago