oscp
Here are 349 public repositories matching this topic...
Personal Bloodhound Community Edition notes
-
Updated
Dec 29, 2023
A python3.6+ script to convert Nmap XML outputs to CSV. Useful for writing OSCP or any kind of pentesting report.
-
Updated
Aug 22, 2022 - Python
Access to the Spatial Service Discovery of Open Spatial Computing Platform
-
Updated
Jan 15, 2024 - TypeScript
A text file that contains most of the commands that we run during hackthebox enumeration and exams like OSCP that can be easy be viewed by guake
-
Updated
Oct 31, 2020 - Shell
Script to generate usernames wordlist to help enumerate Active Directory users based on their names. Supports multiple naming formats.
-
Updated
Jan 20, 2022 - Python
Custom alias or functions that are helpful during CTF / engagement
-
Updated
Aug 11, 2022
simple python script to crack known password from cracker.offensive-security.com site.
-
Updated
Apr 9, 2020 - Python
A template I use for taking notes during CTF. Great for OSCP as well.
-
Updated
Jun 15, 2022
Tryhackme rooms walkthrough will be posted here
-
Updated
Dec 25, 2020
Quickly crack simple stack based buffer overflows
-
Updated
Jan 5, 2023 - Python
Notes, payloads,scripts and tools for OSCP
-
Updated
Dec 30, 2023 - Python
Easy access to the Spatial Content Discovery system of the Open Spatial Computing Platform from Open AR Cloud
-
Updated
Jan 15, 2024 - TypeScript
This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service or execute arbitrary code.
-
Updated
Sep 8, 2020 - Python
Just another open source and transparent OSCP Preperation repo
-
Updated
Aug 2, 2022 - Shell
Improve this page
Add a description, image, and links to the oscp topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the oscp topic, visit your repo's landing page and select "manage topics."