Interview questions to screen offensive (red team/pentest) candidates
☆12Apr 7, 2017Updated 8 years ago
Alternatives and similar repositories for offensiveinterview
Users that are interested in offensiveinterview are comparing it to the libraries listed below
Sorting:
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- CTF write-ups from the VulnHub CTF Team☆10Mar 23, 2018Updated 7 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆16Aug 10, 2016Updated 9 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- Repository to hold and publish Spot The Bug challenges☆20Mar 22, 2018Updated 7 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- A project built in .NET and Angular with angular where good programming practices are applied.☆14Oct 16, 2023Updated 2 years ago
- ☆14Feb 4, 2024Updated 2 years ago
- Red Teaming Tactics and Techniques☆11Sep 11, 2020Updated 5 years ago
- WPF Control Explorer is a simple tool that allows you to explore the various built-in controls used in creating WPF desktop applications.☆10Jul 10, 2020Updated 5 years ago
- ☆16Feb 26, 2023Updated 3 years ago
- A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.☆15Jul 19, 2020Updated 5 years ago
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated 11 months ago
- Development repository for the freebsd cookbook☆26Mar 2, 2026Updated 2 weeks ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Hack Cameras CCTV FREE☆17Aug 22, 2021Updated 4 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Oct 8, 2020Updated 5 years ago
- A collection of hacks and one-off scripts☆11Apr 6, 2020Updated 5 years ago
- Metasploit Framework☆11Apr 18, 2019Updated 6 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆13Dec 29, 2020Updated 5 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Oct 2, 2016Updated 9 years ago
- This repository provides insight on how to get started with Microsoft Security☆11Nov 27, 2025Updated 3 months ago
- BLEMystique is an ESP32 based custom BLE target☆14Dec 30, 2018Updated 7 years ago
- FiveM Cheat with KEKHACK. Injected with simple injector in c++.☆16Feb 6, 2023Updated 3 years ago
- another pwndb tool with more options☆15Mar 20, 2021Updated 5 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Nov 25, 2016Updated 9 years ago
- Custom firmware for DEFCON 27 badge which iterates over all types☆12Aug 11, 2019Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆12May 21, 2024Updated last year
- ☆41Jul 15, 2016Updated 9 years ago
- U3 armory - exploiting the AutoRunz☆22Feb 7, 2017Updated 9 years ago
- My dotfiles for zsh, vim, i3, polybar, alacritty ...☆25Jan 20, 2026Updated 2 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Apr 5, 2019Updated 6 years ago
- Custom pentesting tools☆16Dec 11, 2019Updated 6 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- Show your Instagram profile on your website. 🌈☆27Jan 13, 2022Updated 4 years ago
- This is the unofficial website for the Microsoft Student Partners☆17May 9, 2020Updated 5 years ago
- This repository is for tech bookworms☆25Sep 26, 2020Updated 5 years ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 11 months ago