| x64dbg/x64dbg |
42,376 |
|
0 |
0 |
over 2 years ago |
0 |
|
573 |
other |
C++ |
| An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis. |
| OlivierLaflamme/Cheatsheet-God |
4,540 |
|
0 |
0 |
over 2 years ago |
0 |
|
5 |
|
|
| Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet |
| mantvydasb/RedTeaming-Tactics-and-Techniques |
3,651 |
|
0 |
0 |
about 2 years ago |
0 |
|
15 |
|
PowerShell |
| Red Teaming Tactics and Techniques |
| noraj/OSCP-Exam-Report-Template-Markdown |
3,087 |
|
0 |
0 |
over 2 years ago |
0 |
|
3 |
mit |
Ruby |
| :orange_book: Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report |
| diego-treitos/linux-smart-enumeration |
3,029 |
|
0 |
0 |
over 2 years ago |
0 |
|
3 |
gpl-3.0 |
Shell |
| Linux enumeration tool for pentesting and CTFs with verbosity levels |
| Ignitetechnologies/Privilege-Escalation |
2,698 |
|
0 |
0 |
about 3 years ago |
0 |
|
1 |
|
|
| This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples. |
| rewardone/OSCPRepo |
2,388 |
|
0 |
0 |
almost 6 years ago |
0 |
|
0 |
mit |
C |
| A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' CherryTree. Reconscan Py2 and Py3. Custom ISO building. |
| 0xsyr0/OSCP |
2,235 |
|
0 |
0 |
about 2 years ago |
0 |
|
0 |
gpl-3.0 |
Python |
| OSCP Cheat Sheet |
| codingo/Reconnoitre |
2,053 |
|
0 |
0 |
over 3 years ago |
0 |
|
11 |
gpl-3.0 |
Python |
| A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing. |
| TH3xACE/SUDO_KILLER |
2,032 |
|
0 |
0 |
about 2 years ago |
0 |
|
0 |
mit |
Shell |
| A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user. |