pwk notes and scripts
☆14Apr 29, 2015Updated 10 years ago
Alternatives and similar repositories for pwk
Users that are interested in pwk are comparing it to the libraries listed below
Sorting:
- Scripts to control an "OSCP-like" lab environment.☆23Aug 14, 2017Updated 8 years ago
- This is my path to OSCP☆11Jun 16, 2018Updated 7 years ago
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- ☆17Mar 10, 2018Updated 7 years ago
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- ☆19Aug 20, 2017Updated 8 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆46Sep 28, 2022Updated 3 years ago
- ☆23Jan 18, 2021Updated 5 years ago
- Created on 10th August 2017. Purpose of this Project is to note down every useful object I gained during the time I spent working on OSCP…☆19Feb 26, 2018Updated 8 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Jul 7, 2017Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- Empower your enumeration during OSCP☆36Dec 7, 2018Updated 7 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last week
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- ☆14Jul 30, 2020Updated 5 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Misc malware stuff☆11Sep 30, 2020Updated 5 years ago
- ☆10Sep 22, 2022Updated 3 years ago
- 🪓 High-Speed Log Analysis & Forensics Tool - Part of NullSec Toolkit☆65Updated this week
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- SLSA Proposals☆11Jan 29, 2024Updated 2 years ago
- The VulnCheck Github Action☆13Feb 25, 2026Updated last week