All Projects → alexiasa → oscp-omnibus

alexiasa / oscp-omnibus

Licence: GPL-3.0 license
A collection of resources I'm using while working toward the OSCP

Projects that are alternatives of or similar to oscp-omnibus

OSCP-A-Step-Forward
Opening the door, one reverse shell at a time
Stars: ✭ 126 (+173.91%)
Mutual labels:  penetration-testing, offensive-security, oscp, pwk
Vanquish
Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (+876.09%)
Mutual labels:  penetration-testing, offensive-security, oscp
Rapidscan
🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+1584.78%)
Mutual labels:  penetration-testing, offensive-security, oscp
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+1567.39%)
Mutual labels:  penetration-testing, offensive-security, oscp
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+295.65%)
Mutual labels:  penetration-testing, infosec, offensive-security
Awesome Oscp
A curated list of awesome OSCP resources
Stars: ✭ 804 (+1647.83%)
Mutual labels:  penetration-testing, offensive-security, oscp
Roadmap
GitBook: OSCP RoadMap
Stars: ✭ 89 (+93.48%)
Mutual labels:  penetration-testing, infosec, oscp
Buffer overflow
Don't let buffer overflows overflow your mind
Stars: ✭ 131 (+184.78%)
Mutual labels:  penetration-testing, offensive-security, oscp
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+3865.22%)
Mutual labels:  penetration-testing, offensive-security, oscp
ggtfobins
Get GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-41.3%)
Mutual labels:  penetration-testing, infosec, oscp
PyParser-CVE
Multi source CVE/exploit parser.
Stars: ✭ 25 (-45.65%)
Mutual labels:  penetration-testing, infosec
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+208.7%)
Mutual labels:  penetration-testing, infosec
writeups
Writeups for vulnerable machines.
Stars: ✭ 110 (+139.13%)
Mutual labels:  offsec, oscp
RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
Stars: ✭ 2,991 (+6402.17%)
Mutual labels:  offensive-security, oscp
machinescli
This tool provides commandline access for https://www.hackthebox.eu, https://tryhackme.com/ and https://www.vulnhub.com/ machines.
Stars: ✭ 34 (-26.09%)
Mutual labels:  offsec, oscp
rejig
Turn your VPS into an attack box
Stars: ✭ 33 (-28.26%)
Mutual labels:  infosec, offsec
DNSExplorer
Bash script that automates the enumeration of domains and DNS servers in the active information gathering.
Stars: ✭ 33 (-28.26%)
Mutual labels:  penetration-testing, offensive-security
pentest-reports
Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.
Stars: ✭ 111 (+141.3%)
Mutual labels:  penetration-testing, infosec
wifi-penetration-testing-cheat-sheet
Work in progress...
Stars: ✭ 149 (+223.91%)
Mutual labels:  penetration-testing, offensive-security
SuperLibrary
Information Security Library
Stars: ✭ 60 (+30.43%)
Mutual labels:  infosec, offensive-security

OSCP omnibus

a collection of OSCP resources for everyone 📚

Books

Other Resources by Topic

Information Gathering

Passive

Active

Vulns

Buffer Overflows

Exploit Development

Working with Exploits

I've been spending a lot of time reading up on pointers in C for this section.

Post-Exploitation

Upgrading Shells & Transferring Files

SQL

Privilege Escalation

Windows

Scripts/Executables

Linux

Web Application Attacks

Tunneling and Port Redirection

Metasploit


Other Random Stuff

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].