☆14Nov 18, 2021Updated 4 years ago
Alternatives and similar repositories for OSCP-Practice-Exam-Generator
Users that are interested in OSCP-Practice-Exam-Generator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆21Aug 28, 2022Updated 3 years ago
- Scripts I created to pass the OSCP☆22Jul 23, 2021Updated 4 years ago
- No alias directive for graphql mutation and query types. It can limit the amount of alias fields that can be used for queries and mutatio…☆12Feb 7, 2026Updated last month
- A Sea of Thieves treasure map identifier☆13Apr 20, 2023Updated 2 years ago
- ☆11Jan 9, 2019Updated 7 years ago
- This repo contains example software for the Kernelcon 2021 Hack Live! badge - the Hacker HotKey.☆17May 7, 2021Updated 4 years ago
- TEA cipher in CBC mode written in DRAKON Editor + C as a fun exercise.☆15Jun 6, 2012Updated 13 years ago
- Post exploitation helper☆37Apr 25, 2023Updated 2 years ago
- ☆15Aug 25, 2021Updated 4 years ago
- A checklist to help students track their OSCP exercise progress.☆145Aug 10, 2022Updated 3 years ago
- Prepare, Hunt, and Respond - Conceptual model against cyber attacks by JYVSECTEC☆62Jan 10, 2022Updated 4 years ago
- Keep Your Sandbox Tight! – Actually just a collection of my own tight sandbox configurations.☆16Jan 22, 2025Updated last year
- ☆13Jan 3, 2021Updated 5 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆25Apr 19, 2022Updated 3 years ago
- Elastic version of SOC prime watcher rules☆30Oct 14, 2024Updated last year
- Rust-based password mutator for brute force attacks☆13Mar 21, 2025Updated last year
- ☆25Sep 17, 2023Updated 2 years ago
- ☆10Aug 21, 2024Updated last year
- Incursore came from nmapAutomator to be your personal raider while you enumerate a target.☆52Jul 12, 2024Updated last year
- Yet another set of CISSP mnemonics☆22Mar 10, 2026Updated 2 weeks ago
- A package to integrate rollout into your Laravel project.☆24May 28, 2024Updated last year
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆25Nov 18, 2025Updated 4 months ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆32Mar 2, 2019Updated 7 years ago
- This is my penetration testing cheatsheet☆133Feb 15, 2026Updated last month
- Bruteforce connecting to a specific Sea of Thieves server. Useful if you want to be in the same server as your friends.☆28Jul 7, 2024Updated last year
- Unofficial micro-architecture optimized hardened_malloc package☆13Updated this week
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The c…☆17Mar 30, 2023Updated 2 years ago
- ☆12Aug 22, 2017Updated 8 years ago
- A privacy focused, Chromium browser for web scraping. Built with Tor and PySide6 (a QT framework).☆10Mar 13, 2023Updated 3 years ago
- LDAP Enumeration Tool☆13Mar 28, 2024Updated last year
- XXE techniques☆14Oct 10, 2021Updated 4 years ago
- ☆12Mar 2, 2026Updated 3 weeks ago
- Awesome hacking is an awesome collection of hacking tools.☆14Apr 24, 2019Updated 6 years ago
- DLL Malware for Signal Desktop. Now utilizes missing dbghelp.dll since Signal patched cryptbase.☆14Jan 24, 2025Updated last year
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- ☆13Jul 5, 2023Updated 2 years ago
- Ctrl+Shift+T for PowerShell Terminals☆12Sep 28, 2020Updated 5 years ago
- ☆13Mar 7, 2025Updated last year