usezfsyo / pwkView external linksLinks
pwk notes and scripts
☆14Apr 29, 2015Updated 10 years ago
Alternatives and similar repositories for pwk
Users that are interested in pwk are comparing it to the libraries listed below
Sorting:
- OSCP Scripts☆14Jan 21, 2016Updated 10 years ago
- ☆26Sep 2, 2016Updated 9 years ago
- Scripts to control an "OSCP-like" lab environment.☆23Aug 14, 2017Updated 8 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆34Nov 6, 2017Updated 8 years ago
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆46Sep 28, 2022Updated 3 years ago
- Created on 10th August 2017. Purpose of this Project is to note down every useful object I gained during the time I spent working on OSCP…☆19Feb 26, 2018Updated 7 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- FireEye Alert json files to MISP Malware information sharing plattform (Alpha)☆32Jun 11, 2017Updated 8 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆25Jul 7, 2017Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Aug 3, 2018Updated 7 years ago
- Empower your enumeration during OSCP☆36Dec 7, 2018Updated 7 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11May 10, 2025Updated 9 months ago
- Some basic shell code, when I learn <Gray Hat Hacking>☆11Dec 6, 2014Updated 11 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Provides a multi-platform Graphical User Interface for hashlookup☆12Jul 12, 2024Updated last year
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- Cobalt Strike Launcher on macOS☆12Nov 28, 2022Updated 3 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 6 years ago
- Custom reimplementation of LogManager service, redirecting logs to SD card☆10Apr 27, 2020Updated 5 years ago
- Emoji Favicon Toolkit - Set your favicon to emoji using canvas & cache as /favicon.ico with service workers☆16Mar 16, 2019Updated 6 years ago
- An application for retrieving and viewing success metrics from Sonatype Nexus IQ☆17Feb 14, 2025Updated last year
- Azure Databricks workshops with content on connectivity to Azure services, data engineering workflows and data sciences notebooks.☆11Feb 20, 2019Updated 6 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- This open-source project tracks RED-LILI's activity over time as there are evidence the actor is still active. All information provided h…☆11Jun 23, 2023Updated 2 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Mar 13, 2016Updated 9 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- Attempts to brute force the password of a zip file☆10May 31, 2016Updated 9 years ago
- DAL (Data Access Layer) - a proxy for SQL databases with MongoDB inspired query interface☆11Sep 2, 2024Updated last year
- Automatically exported from code.google.com/p/windbgshark☆11Jul 1, 2015Updated 10 years ago