sparshkulshrestha / OSCP-TRY-HARDER-View external linksLinks
Welcome to OSCP!!!
☆14Jan 30, 2020Updated 6 years ago
Alternatives and similar repositories for OSCP-TRY-HARDER-
Users that are interested in OSCP-TRY-HARDER- are comparing it to the libraries listed below
Sorting:
- ☆22Mar 27, 2019Updated 6 years ago
- Penetration Testing, Vulnerability Assessment and Red Team Learning☆135Jan 17, 2026Updated last month
- ☆10Jan 26, 2026Updated 3 weeks ago
- ☆37Jul 25, 2019Updated 6 years ago
- Blogs, Tools and other available resources for source code review.☆10Nov 18, 2021Updated 4 years ago
- Detection rules and threat hunting queries in Defender XDR and Azure Sentinel☆16Updated this week
- The best way to send emails in Go.☆12Feb 4, 2021Updated 5 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Plugin for ExileAPI☆10Apr 9, 2023Updated 2 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- 🇫🇷 A list of neat projects made in France☆14Feb 13, 2025Updated last year
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- ☆13Sep 22, 2022Updated 3 years ago
- Random code snippets☆11Oct 27, 2023Updated 2 years ago
- Cobalt Strike BOF☆42Dec 10, 2025Updated 2 months ago
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆14Aug 15, 2022Updated 3 years ago
- Code for "HARPOONEERS AND SAILORS", a novel I generated for NaNoGenMo 2015.☆10Nov 4, 2015Updated 10 years ago
- Automatically generated Sysmon parser for Azure Sentinel☆17Jan 6, 2026Updated last month
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated 10 months ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Sep 19, 2019Updated 6 years ago
- Windows productivity tweaks☆15Feb 21, 2020Updated 5 years ago
- SysCalling is an educational project demonstrating state-of-the-art syscall execution techniques for bypassing user-space EDR controls in…☆14Dec 8, 2024Updated last year
- Generate Gmail Emailing Keyloggers to Windows.☆12Jul 28, 2019Updated 6 years ago
- Spoof parent process ID☆13Jan 23, 2019Updated 7 years ago
- Beginners Guide to Hunting for Threats☆17Apr 26, 2025Updated 9 months ago
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- ☆13Dec 22, 2017Updated 8 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Vulnerable Bank Web Application for Cyber Security Course☆13Dec 11, 2022Updated 3 years ago
- Python library for Adversarial ML Evaluation☆25Jul 14, 2025Updated 7 months ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- ☆18Sep 1, 2025Updated 5 months ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- exploits.shodan.io's unofficial api no api-key needed☆16Apr 10, 2021Updated 4 years ago
- Pwn2Win CTF 2019 flag submissions☆14May 28, 2020Updated 5 years ago
- The purpose of this repo is to share my research☆14Apr 7, 2025Updated 10 months ago
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Sep 11, 2024Updated last year