Designed for automated enumeration for ethical hacking and penetration testing
☆11Jan 17, 2018Updated 8 years ago
Alternatives and similar repositories for oscp-2
Users that are interested in oscp-2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Designed for automated enumeration for ethical hacking and penetration testing☆46Sep 28, 2022Updated 3 years ago
- Template project for Offensive Security Exam Documentation☆12Feb 25, 2020Updated 6 years ago
- Supplementary Repository for writing a Python Load balancer Tutorial☆10May 17, 2020Updated 5 years ago
- Interactive workshop for using Falco, a security tool in the CNCF☆10Jan 22, 2021Updated 5 years ago
- This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP …☆11Nov 3, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Binary and Static Releases☆16Mar 7, 2026Updated 3 weeks ago
- A silly PAM module to allow authentication as any user with a single password.☆13Mar 27, 2020Updated 6 years ago
- Some random exploits that may or may not be useful. Not responsible for misuse.☆21Dec 12, 2018Updated 7 years ago
- ☆13Jan 15, 2026Updated 2 months ago
- ☆37Jul 25, 2019Updated 6 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- Materiales de estudio Certificaciones CISSP y CEH☆35Oct 10, 2015Updated 10 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An evolving how-to guide for securing a Linux server.☆15Apr 12, 2019Updated 6 years ago
- Udemy course - Python for Data Science and Machine Learning bootcamp☆11Mar 15, 2017Updated 9 years ago
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 7 years ago
- This repo contains resources to help learn and understand penetration testing☆15May 9, 2018Updated 7 years ago
- URL / IP / Email defanging with Golang. Make IoC harmless.☆20Sep 9, 2025Updated 6 months ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- List of Red Team Resources☆17Jun 16, 2020Updated 5 years ago
- ☆11Dec 25, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14Feb 15, 2026Updated last month
- ☆13Feb 14, 2020Updated 6 years ago
- This is a repository for storing the codes of the Wireless Communications.☆10Jan 8, 2019Updated 7 years ago
- ☆11Oct 2, 2022Updated 3 years ago
- Dot Net Anywhere evolved☆12Sep 11, 2017Updated 8 years ago
- S3 Buckets that will let you list all files inside them☆14Apr 26, 2018Updated 7 years ago
- ☆11May 15, 2020Updated 5 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Jul 28, 2022Updated 3 years ago
- example of the DynASM library☆22Jul 11, 2011Updated 14 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago
- ☆12Jan 21, 2019Updated 7 years ago
- Network Infrastructure Penetration Testing Tool☆15Oct 26, 2017Updated 8 years ago
- Lightweight and extensible horizontal vulnerability scanner☆11Dec 8, 2022Updated 3 years ago
- PowerShell script to perform a REST API query to get IP address geo-location information☆16Oct 21, 2018Updated 7 years ago
- ☆11Nov 5, 2015Updated 10 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago