tanc7 / CustomToolsLinks
For Interview, OSCP proof of concept code during the course.
☆17Updated 6 years ago
Alternatives and similar repositories for CustomTools
Users that are interested in CustomTools are comparing it to the libraries listed below
Sorting:
- Repository to put my notes related to OSCP certification☆20Updated 6 years ago
- You don't need wires to be connected☆41Updated 5 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆64Updated 6 years ago
- Journey to Try Harder !!!☆32Updated 6 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆98Updated 2 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆63Updated 6 years ago
- ☆42Updated 4 years ago
- Scripts created to use with the OSCP exercises☆47Updated 3 years ago
- A collection of resources I'm using while working toward the OSCP☆78Updated 3 years ago
- ☆32Updated 4 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- ☆84Updated 5 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Updated 6 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 3 years ago
- Offensive Security Wireless Professional☆17Updated 5 years ago
- A collection of tools, notes, & resources I've created during my OSCP certification journey.☆10Updated 4 years ago
- ☆30Updated 6 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- OSCP Notes written from PWK Course☆52Updated 4 years ago
- eLearnSecurity Certified Exploit Development☆105Updated 4 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆65Updated 4 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- ☆23Updated 5 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- ☆67Updated 3 years ago
- ☆13Updated 5 years ago
- Windows Penetration Testing Toolkit☆15Updated 3 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆23Updated 2 weeks ago
- ☆50Updated 5 years ago