OSCP Study Guide
☆41Oct 10, 2022Updated 3 years ago
Alternatives and similar repositories for OSCP
Users that are interested in OSCP are comparing it to the libraries listed below
Sorting:
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 3 years ago
- A tool for pulling top-10 cves from cvetrend.com. ;)☆14Aug 4, 2022Updated 3 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆23Mar 11, 2020Updated 6 years ago
- A Bluetooth receiver implementation for GNU Radio☆26Jun 7, 2025Updated 9 months ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- Simple bash script to spray known credentials against multiple services with netexec☆71Jan 16, 2026Updated 2 months ago
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- I collected it to help the bug hunter get a reward☆57Sep 7, 2022Updated 3 years ago
- ☆12Mar 10, 2019Updated 7 years ago
- Script to test NetSec capabilities.☆21May 1, 2023Updated 2 years ago
- PoC☆12Apr 7, 2025Updated 11 months ago
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Apr 17, 2024Updated last year
- single-threaded event driven sleep obfuscation poc for linux☆38Jun 14, 2025Updated 9 months ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆87May 16, 2022Updated 3 years ago
- ☆14Jun 30, 2022Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- ☆25Jan 11, 2023Updated 3 years ago
- collection of apis used in malware development☆229Aug 2, 2022Updated 3 years ago
- Basic website cloner written in Python☆55Sep 13, 2023Updated 2 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆49Jul 28, 2025Updated 7 months ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- An index of vendors in the MSP space who have published their Vulnerability Disclosure Program and Bug Bounty Programs.☆12Apr 19, 2022Updated 3 years ago
- Fetch information about a public Google document.☆13Aug 4, 2023Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Feb 15, 2022Updated 4 years ago
- ☆12Feb 3, 2026Updated last month
- Advanced test for proxy & waf☆14Feb 10, 2026Updated last month
- ☆12Feb 18, 2022Updated 4 years ago
- CTFs I've played so far☆17Feb 1, 2025Updated last year
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Apr 7, 2021Updated 4 years ago
- ☆26Jun 2, 2022Updated 3 years ago
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- ☆12Jan 4, 2022Updated 4 years ago
- ☆14Oct 25, 2022Updated 3 years ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆243Sep 6, 2024Updated last year
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Workshop & Talk Slide Decks from HackSpaceCon☆26Dec 14, 2025Updated 3 months ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago