pwk notes and scripts
☆14Apr 29, 2015Updated 11 years ago
Alternatives and similar repositories for pwk
Users that are interested in pwk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆26Sep 2, 2016Updated 9 years ago
- OSCP Scripts☆14Jan 21, 2016Updated 10 years ago
- Scripts to control an "OSCP-like" lab environment.☆23Aug 14, 2017Updated 8 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆34Nov 6, 2017Updated 8 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Mar 14, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- ☆11Apr 18, 2018Updated 8 years ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Automation scripts in preparation for PWK/OSCP labs☆17Sep 20, 2021Updated 4 years ago
- The yaml documents for the CTFman search system.☆12May 16, 2019Updated 6 years ago
- ☆19Aug 20, 2017Updated 8 years ago
- Offsec PWB Lab Tools☆13Nov 14, 2013Updated 12 years ago
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- ☆17Mar 10, 2018Updated 8 years ago
- VLAN attacks toolkit☆12Sep 1, 2022Updated 3 years ago
- ☆10Sep 28, 2014Updated 11 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- Automation framework for attack-defense CTFs.☆16Nov 22, 2019Updated 6 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- Created on 10th August 2017. Purpose of this Project is to note down every useful object I gained during the time I spent working on OSCP…☆19Feb 26, 2018Updated 8 years ago
- This repository is the final location for tools I built from the book Black Hat Python☆12Aug 1, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆15Nov 1, 2018Updated 7 years ago
- poc or exp of some famous vulnerability☆14Mar 5, 2014Updated 12 years ago
- ☆55Aug 18, 2020Updated 5 years ago
- ☆23Jan 18, 2021Updated 5 years ago
- Just some exploits :P☆47Jan 18, 2021Updated 5 years ago
- HTTP requests of FrontPage expolit☆26Dec 19, 2013Updated 12 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Empower your enumeration during OSCP☆36Dec 7, 2018Updated 7 years ago
- Automate pwnage☆12Jul 17, 2018Updated 7 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆55Apr 18, 2019Updated 7 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Jun 24, 2016Updated 9 years ago
- Socks5 server over Websockets☆40Oct 17, 2018Updated 7 years ago
- A collection of various awesome lists for hackers, pentesters and security researchers☆32Feb 26, 2019Updated 7 years ago