Welcome to OSCP!!!
☆14Jan 30, 2020Updated 6 years ago
Alternatives and similar repositories for OSCP-TRY-HARDER-
Users that are interested in OSCP-TRY-HARDER- are comparing it to the libraries listed below
Sorting:
- Blogs, Tools and other available resources for source code review.☆10Nov 18, 2021Updated 4 years ago
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- Penetration Testing, Vulnerability Assessment and Red Team Learning☆135Mar 8, 2026Updated last week
- Subdomain discovery using Sublist3r, certspotter, crt.sh , censys and amass . Subdomain bruteforcing using Gobuster and Resolve hosts usi…☆16Oct 8, 2024Updated last year
- ☆23Mar 27, 2019Updated 6 years ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 3 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Sep 19, 2019Updated 6 years ago
- ☆12Apr 23, 2021Updated 4 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Generate Gmail Emailing Keyloggers to Windows.☆12Jul 28, 2019Updated 6 years ago
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Nov 12, 2021Updated 4 years ago
- This Repo Contain Summary of The eLearnSecurity Web Application Penetration Tester certification Content☆20Apr 9, 2022Updated 3 years ago
- Tool designed for fast crawl and extract endpoints☆16Apr 5, 2021Updated 4 years ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Aug 15, 2022Updated 3 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated last month
- Post-exploitation tool for attacking Active Directory domain controllers☆18Dec 18, 2022Updated 3 years ago
- ☆13Sep 22, 2022Updated 3 years ago
- All the useful tools interesting to be used☆24Sep 20, 2022Updated 3 years ago
- Simple Bash Script For Collecting Wordpress Username☆20Feb 28, 2021Updated 5 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Mar 13, 2026Updated last week
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Vulnerable Bank Web Application for Cyber Security Course☆13Dec 11, 2022Updated 3 years ago
- exploits.shodan.io's unofficial api no api-key needed☆16Apr 10, 2021Updated 4 years ago
- strong-frida patches☆25Jan 17, 2023Updated 3 years ago
- ☆20May 1, 2023Updated 2 years ago
- HackbotOne website produce contents from various domains such as Web Hacking, Bug Bounty, Application Development & Game Development.☆12May 17, 2021Updated 4 years ago
- Unnamed repository; edit this file 'description' to name the repository.☆15Jul 6, 2015Updated 10 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- ☆13May 8, 2019Updated 6 years ago
- Hunt and Analyze Tor Onion Sites☆23Dec 8, 2022Updated 3 years ago
- Downloader to recover lost infection☆17Jul 6, 2015Updated 10 years ago
- An Automated Network Penetration and Vulnerability Analysis Tool Written In Bash☆29Apr 6, 2022Updated 3 years ago
- A new collector, implemented the right way (in Ruby).☆16Jul 6, 2015Updated 10 years ago
- Windows Privilege Escalation☆30Aug 14, 2020Updated 5 years ago
- Offline installation media☆18Jul 6, 2015Updated 10 years ago
- Repository resource for threat hunter☆158Sep 14, 2018Updated 7 years ago
- ☆166Feb 13, 2020Updated 6 years ago
- command line melter☆18Jul 6, 2015Updated 10 years ago