wetw0rk / SLAE
The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam
☆17Updated 7 years ago
Alternatives and similar repositories for SLAE:
Users that are interested in SLAE are comparing it to the libraries listed below
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 5 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Updated 7 years ago
- Automation scripts in preparation for PWK/OSCP labs☆17Updated 3 years ago
- Personal blog about security, exploitation, CTFs, ...☆20Updated 6 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Script to automate, manage, and multithread Nikto scans.☆59Updated 5 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆32Updated 7 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆19Updated 4 years ago
- pentestscripts☆16Updated 5 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- ☆18Updated 7 years ago
- ☆16Updated 7 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- Plugins for the Serpico Project☆23Updated 6 years ago
- ☆33Updated 2 months ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- Scripts to control an "OSCP-like" lab environment.☆23Updated 7 years ago
- Import Nmap scans to Cherrytree☆37Updated 2 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Updated 7 years ago
- My notes, exercises, and reports on reverse engineering and penetrating applications☆17Updated 6 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Updated 7 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Updated 4 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- List of Bloodhound Python Custom Queries which I have found to be handy on engagements☆17Updated 5 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆109Updated 5 months ago
- A parser to extract information from .nessus file format☆23Updated 4 years ago