zweilosec / Infosec-NotesLinks
Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.
☆83Updated 2 weeks ago
Alternatives and similar repositories for Infosec-Notes
Users that are interested in Infosec-Notes are comparing it to the libraries listed below
Sorting:
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- ☆67Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- You don't need wires to be connected☆41Updated 5 years ago
- Web Hacking and Red Teaming MindMap☆77Updated 3 weeks ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- ☆22Updated last year
- Attack Surface Discovery Tool☆109Updated 11 months ago
- OSCP preperation and HackTheBox write ups.☆60Updated 2 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 4 years ago
- Offensive Security OSWE Prep 2022☆74Updated 2 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆52Updated 3 years ago
- OSCP preparation tools, scripts and cheatsheets☆57Updated 2 years ago
- Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and h…☆93Updated 2 months ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆110Updated last week
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi …☆81Updated 4 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆40Updated 2 years ago
- ☆75Updated 4 years ago
- ☆29Updated 4 years ago
- A set of instructions, command and techniques that help during an Active Directory Assessment.☆85Updated 4 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆76Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- Notes for CRTP☆41Updated 4 years ago
- OWASP based Web Application Security Testing Checklist☆78Updated last year
- ☆44Updated 2 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆60Updated last year
- ☆76Updated 4 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆161Updated last week
- ☆60Updated last month
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago