Material i gathered for the Offensive Security Certified Professional OSCP
☆14Jan 15, 2019Updated 7 years ago
Alternatives and similar repositories for oscp_material
Users that are interested in oscp_material are comparing it to the libraries listed below
Sorting:
- Git All the Payloads! A collection of web attack payloads.☆10Dec 31, 2018Updated 7 years ago
- Security Related Tools and Resources☆16Aug 10, 2017Updated 8 years ago
- Simple Random Password Generator [BASH]☆10Sep 24, 2018Updated 7 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆13May 18, 2018Updated 7 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆10Aug 9, 2018Updated 7 years ago
- Generate reverse shells in command line with Go !☆20Aug 9, 2020Updated 5 years ago
- ☆13Sep 7, 2023Updated 2 years ago
- CISSP Books Free Download☆22Jul 27, 2024Updated last year
- Helped during my OSCP lab days.☆28Dec 7, 2016Updated 9 years ago
- A collection of hacking / penetration testing resources to make you better!☆70Aug 17, 2018Updated 7 years ago
- OG Atomic Red Team☆30Jun 12, 2018Updated 7 years ago
- Scripts, POCs & bullshit☆31May 29, 2025Updated 9 months ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- ☆18Jan 20, 2026Updated 2 months ago
- sample configs showing how to colorize the output of nmap☆14Mar 25, 2021Updated 4 years ago
- ☆13Dec 15, 2024Updated last year
- Qui puoi trovare i comandi aggiornati per l'uso con Debian 11. Se hai acquistato il libro prima del 2022 probabilmente sei nel posto gius…☆15Jan 11, 2023Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Solutions to some exercises in the book Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation 1s…☆14Sep 22, 2023Updated 2 years ago
- Notes some analysis related to VidarStealer sample☆16May 5, 2024Updated last year
- This report was written for the Digital Forensics Analysis coursework, specifically the first assignment. In which, steps and screenshots…☆13Jul 17, 2023Updated 2 years ago
- Source code of https://blahcat.github.io☆13Oct 6, 2025Updated 5 months ago
- Tutorials and Things to Do while Hunting Vulnerability.☆13Aug 30, 2022Updated 3 years ago
- Tool for enumerate subdomains by Brute-force, or by using different options while grabbing results.☆14Sep 7, 2023Updated 2 years ago
- ☆16Oct 18, 2024Updated last year
- ☆15Jan 24, 2023Updated 3 years ago
- ☆13Mar 7, 2025Updated last year
- Extracting api keys and secrets by requesting each url at the your list.☆20Jul 5, 2024Updated last year
- Turn your Solana Seeker (or any Android phone) into a 24/7 personal AI agent☆61Updated this week
- Libro sulla consapevolezza della sicurezza informatica, scritto in italiano e totalmente in creative commons☆17Jan 27, 2026Updated last month
- Guide to building Nethunter kernels for Android devices.☆21Feb 3, 2026Updated last month
- A basic flask based Outlook Web Honey pot☆70May 2, 2023Updated 2 years ago
- A summary of the most abbreviations I encountered so far☆28Jan 18, 2026Updated 2 months ago
- This project or App is created to register, display and record marks of students. it was created using HTML, CSS, BOOTSTRAP, JAVASCRIPT a…☆10Apr 20, 2024Updated last year
- A very simple Non destructive solution to reset Windows Password☆26May 5, 2024Updated last year
- The Plant Store -Ecommerce Website - for beginer using HTML, CSS, Vanilla JavaScript☆13Aug 12, 2022Updated 3 years ago
- Grafana RCE exploit (CVE-2024-9264)☆39Oct 21, 2024Updated last year
- Mr. CrackBot AI uses the NVIDIA Jetson Nano 4GB to perform AI-driven penetration testing. It combines GPU-accelerated password cracking w…☆60Dec 24, 2024Updated last year
- PowerShell scripts to aid investigators when utilizing O365 and Magnet Axiom.☆12Aug 26, 2024Updated last year