rhodejo / OSCP-Prep
☆93Updated 7 years ago
Alternatives and similar repositories for OSCP-Prep
Users that are interested in OSCP-Prep are comparing it to the libraries listed below
Sorting:
- Learnings from OSCP and other random stuff.☆31Updated last year
- Some of the scripts I use.☆41Updated 8 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- ☆52Updated 4 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- …(⊙_⊙;)…☆56Updated 4 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Custom checklists, cheatsheets, links, and scripts☆125Updated 5 years ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆43Updated 4 years ago
- Created on 10th August 2017. Purpose of this Project is to note down every useful object I gained during the time I spent working on OSCP…☆19Updated 7 years ago
- ☆26Updated 8 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆58Updated 7 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 9 years ago
- pentest tools☆41Updated 7 years ago
- Penetration Testing Playbook (PTP)☆175Updated 6 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 6 years ago
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- ☆121Updated 8 years ago
- stuff i'm willing to share with the world lol☆170Updated 2 years ago
- HP Power Manager 'formExportDataLogs' Buffer Overflow☆21Updated 7 years ago
- Penetration testing scripts☆143Updated 7 years ago
- ☆155Updated 7 years ago
- ☆26Updated 7 years ago
- Windows Enumeration and Privilege Escalation Script☆18Updated 5 years ago
- ☆145Updated 5 years ago
- Just some exploits :P☆46Updated 4 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆17Updated 5 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago