Sharing my cheat-sheet of commands that I collected during prep for OSCP!
☆45Sep 28, 2020Updated 5 years ago
Alternatives and similar repositories for my-cmd-stash
Users that are interested in my-cmd-stash are comparing it to the libraries listed below
Sorting:
- CLI script to use GadgetProbe as a library to generate serialized payloads of DNS callbacks to free DNSbin to probe what Java classpaths …☆14Jun 8, 2021Updated 4 years ago
- Secure Terminal CTF Challenge for DC31 Red Team Village☆19Aug 22, 2023Updated 2 years ago
- Full Antivirus Evasion for Mimikatz☆13Mar 10, 2017Updated 8 years ago
- Template project for Offensive Security Exam Documentation☆11Feb 25, 2020Updated 6 years ago
- Office 365 and Exchange domain federation enumeration tool☆13Sep 6, 2023Updated 2 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- Red Teaming Experiments / Offensive Security / OSCP & Pentesting Cheat Sheets and more☆18Jan 11, 2019Updated 7 years ago
- A dump of all the scripts that I make☆19Jul 4, 2021Updated 4 years ago
- Denial of Service PoC for CVE-2020-1350 (SIGRed)☆18Jul 16, 2020Updated 5 years ago
- The repo contains all the slide deck that was used during my presentation at various webinars, conferences, and meetups.☆57May 13, 2021Updated 4 years ago
- ☆25Jun 15, 2025Updated 8 months ago
- Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.☆25Feb 10, 2022Updated 4 years ago
- ☆26Feb 6, 2026Updated last month
- ☆25Jan 12, 2023Updated 3 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆27May 24, 2024Updated last year
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆27Feb 29, 2016Updated 10 years ago
- CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools,…☆30Feb 22, 2023Updated 3 years ago
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Apr 17, 2024Updated last year
- Creates and sends fake meeting invite☆74Apr 24, 2021Updated 4 years ago
- A modern, web-based GUI for Hashcat that provides an intuitive interface for hash cracking operations, featuring real-time monitoring, pe…☆34Mar 5, 2025Updated last year
- File integrity monitor with malware detection using machine learning☆14May 23, 2024Updated last year
- A simple Markdown checklist for Penetration Testing with Kali Linux 2020 course exercises as part of OSCP.☆63Jun 19, 2020Updated 5 years ago
- A command line tool to detect new unknown device in your network using ARP protocol☆111Feb 4, 2018Updated 8 years ago
- Run search-that-hash from Google colab with fast offline (hashcat) mode☆35Jun 10, 2021Updated 4 years ago
- Complete Python Pandas Tutorial in Hindi (With Notes)☆11Sep 15, 2023Updated 2 years ago
- Debpic lets you easily build Debian packages in an isolated Docker environment.☆11Dec 6, 2024Updated last year
- ☆15Aug 21, 2021Updated 4 years ago
- my home's dotfiles☆50Oct 20, 2015Updated 10 years ago
- ☆48Oct 15, 2025Updated 4 months ago
- ☆32Dec 28, 2023Updated 2 years ago
- ☆37Aug 8, 2021Updated 4 years ago
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆11Sep 24, 2020Updated 5 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- StegsnowBruteForcer — outil Python pour brute-force de mots de passe dans les documents.☆15Feb 17, 2026Updated 2 weeks ago