Sharing my cheat-sheet of commands that I collected during prep for OSCP!
☆44Sep 28, 2020Updated 5 years ago
Alternatives and similar repositories for my-cmd-stash
Users that are interested in my-cmd-stash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reverse Shell-able Windows exploits short POCs.☆35Sep 28, 2020Updated 5 years ago
- ☆13Oct 16, 2025Updated 6 months ago
- CLI script to use GadgetProbe as a library to generate serialized payloads of DNS callbacks to free DNSbin to probe what Java classpaths …☆14Jun 8, 2021Updated 4 years ago
- Secure Terminal CTF Challenge for DC31 Red Team Village☆19Aug 22, 2023Updated 2 years ago
- Office 365 and Exchange domain federation enumeration tool☆13Sep 6, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- CVE-2020-5410 Spring Cloud Config directory traversal vulnerability☆31Jun 16, 2020Updated 5 years ago
- Full Antivirus Evasion for Mimikatz☆14Mar 10, 2017Updated 9 years ago
- ☆14Jul 13, 2020Updated 5 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- Post exploitation helper☆37Apr 25, 2023Updated 2 years ago
- ☆19Mar 16, 2021Updated 5 years ago
- Capture the Flag write-ups for challenged completed by myself.☆13Dec 7, 2020Updated 5 years ago
- The repo contains all the slide deck that was used during my presentation at various webinars, conferences, and meetups.☆57May 13, 2021Updated 4 years ago
- Debpic lets you easily build Debian packages in an isolated Docker environment.☆11Apr 7, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆15Aug 21, 2021Updated 4 years ago
- Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.☆25Feb 10, 2022Updated 4 years ago
- Denial of Service PoC for CVE-2020-1350 (SIGRed)☆18Jul 16, 2020Updated 5 years ago
- A dump of all the scripts that I make☆19Jul 4, 2021Updated 4 years ago
- Red Teaming Experiments / Offensive Security / OSCP & Pentesting Cheat Sheets and more☆18Jan 11, 2019Updated 7 years ago
- Complete Python Pandas Tutorial in Hindi (With Notes)☆11Sep 15, 2023Updated 2 years ago
- Wireless Pentesting Device☆24Aug 14, 2020Updated 5 years ago
- ☆12Apr 5, 2025Updated last year
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A command line tool to detect new unknown device in your network using ARP protocol☆111Feb 4, 2018Updated 8 years ago
- OSWE-cheat sheet module by module with updated syllabus☆12May 25, 2021Updated 4 years ago
- ☆26Feb 6, 2026Updated 2 months ago
- ☆39Aug 8, 2021Updated 4 years ago
- A simple Markdown checklist for Penetration Testing with Kali Linux 2020 course exercises as part of OSCP.☆63Jun 19, 2020Updated 5 years ago
- ☆14Nov 15, 2020Updated 5 years ago
- A Commodore 64 demo with scrolltext and bitmap for internal talk on tretton37.☆12Mar 20, 2018Updated 8 years ago
- Creates and sends fake meeting invite☆74Apr 24, 2021Updated 4 years ago
- Amiga cross compiler sdk☆13Jan 20, 2014Updated 12 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Jan 24, 2025Updated last year
- Scripts that automate portions of pentests.☆58Mar 18, 2026Updated last month
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Apr 4, 2023Updated 3 years ago
- A python based semi-automatic buffer overflow exploit script☆16Sep 6, 2020Updated 5 years ago
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆10Sep 24, 2020Updated 5 years ago
- wew oscp☆284Jun 28, 2022Updated 3 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated 2 years ago