russweir / oscp-2View external linksLinks
Designed for automated enumeration for ethical hacking and penetration testing
☆11Jan 17, 2018Updated 8 years ago
Alternatives and similar repositories for oscp-2
Users that are interested in oscp-2 are comparing it to the libraries listed below
Sorting:
- Designed for automated enumeration for ethical hacking and penetration testing☆46Sep 28, 2022Updated 3 years ago
- Materiales de estudio Certificaciones CISSP y CEH☆34Oct 10, 2015Updated 10 years ago
- Supplementary Repository for writing a Python Load balancer Tutorial☆10May 17, 2020Updated 5 years ago
- ☆37Jul 25, 2019Updated 6 years ago
- Write C++ tutorials and documentation in a restructured text dialect and convert it to HTML. In particular the scripts execute your exam…☆14Jul 8, 2014Updated 11 years ago
- ☆10Oct 2, 2022Updated 3 years ago
- ☆12Dec 25, 2020Updated 5 years ago
- نمونه سوالات و پاسخ های مصاحبه تست نفوذ برنامه های موبایل☆15Aug 21, 2023Updated 2 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 6 years ago
- Udemy course - Python for Data Science and Machine Learning bootcamp☆11Mar 15, 2017Updated 8 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Oct 14, 2021Updated 4 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- Persistent memory system for agentic AI via MCP - remember, recall, forget with semantic search with knowledge graph☆24Updated this week
- Binary and Static Releases☆16Nov 18, 2025Updated 2 months ago
- Port(s) of the OpenEmulator NTSC/PAL GPU shader☆10May 6, 2021Updated 4 years ago
- Webster's Revised Unabridged Dictionary, 1913 edition.☆11Sep 1, 2020Updated 5 years ago
- My nixos configuration☆13Feb 7, 2026Updated last week
- This is a repository for storing the codes of the Wireless Communications.☆10Jan 8, 2019Updated 7 years ago
- example of the DynASM library☆22Jul 11, 2011Updated 14 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Jul 28, 2022Updated 3 years ago
- Dot Net Anywhere evolved☆12Sep 11, 2017Updated 8 years ago
- ☆11Nov 5, 2015Updated 10 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- Template project for Offensive Security Exam Documentation☆11Feb 25, 2020Updated 5 years ago
- ☆12Jan 21, 2019Updated 7 years ago
- Malware-Analysis-Kit☆14Aug 3, 2015Updated 10 years ago
- Collection of small Lua modules☆10Updated this week
- ☆15Mar 15, 2016Updated 9 years ago
- Yet Another RussNet☆15Oct 21, 2021Updated 4 years ago
- Unicode Character Database (UCD) Tools☆13May 9, 2021Updated 4 years ago
- Lightweight and extensible horizontal vulnerability scanner☆11Dec 8, 2022Updated 3 years ago
- Documentation and Support for AttackForge ReportGen☆19Jul 26, 2025Updated 6 months ago
- Markdown Editor mockups following GNOME Human Interface Guidelines☆11Apr 4, 2018Updated 7 years ago
- Interactive workshop for using Falco, a security tool in the CNCF☆10Jan 22, 2021Updated 5 years ago
- An evolving how-to guide for securing a Linux server.☆15Apr 12, 2019Updated 6 years ago
- ☆11May 15, 2020Updated 5 years ago