r0r0x-xx / OSCP-PreLinks
☆21Updated 4 years ago
Alternatives and similar repositories for OSCP-Pre
Users that are interested in OSCP-Pre are comparing it to the libraries listed below
Sorting:
- ☆46Updated 4 years ago
- ☆14Updated 4 years ago
- Offensive Security Wireless Professional☆17Updated 5 years ago
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- ☆16Updated 6 years ago
- Buffer Overflows☆29Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆62Updated 5 years ago
- You don't need wires to be connected☆40Updated 5 years ago
- OSWE Preparation☆37Updated 6 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- ☆48Updated 3 years ago
- Repository to put my notes related to OSCP certification☆19Updated 5 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆43Updated 4 years ago
- ☆29Updated 5 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆18Updated 6 years ago
- For my Try Hack Me room: Intro To Pwntools☆27Updated 4 years ago
- Notes on ECPPT☆22Updated 6 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 3 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Updated 5 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- ☆20Updated 3 years ago
- Exploit code for CVE-2019-17662☆17Updated 3 years ago
- ☆20Updated 3 years ago
- Damn Vulnerable WordPress Site☆52Updated 2 years ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 6 years ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- ☆29Updated 4 years ago