Automated Mass Exploiter
-
Updated
May 22, 2023 - Python
Automated Mass Exploiter
OSCP Cheat Sheet
A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automate your pentest reports with ease.
Predatory ESP32 Firmware
Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool
A Burp extension helps identifying injection flaws (LFI, RCE, SQLi), authentication/authorization issues, and HTTP 403 access violations, while also converting HTTP requests to JavaScript for enhanced XSS exploitation.
This Python application is an OSINT (Open Source Intelligence) tool called "Ominis OSINT - Web Hunter." It performs online information gathering by querying Google for search results related to a user-inputted query. The tool extracts relevant information such as titles, URLs, and potential mentions of the query in the results.
Compiled tools for internal assessments
This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.
OSCP ( Offensive Security Certified Professional )
"Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Security Certified Professional (OSCP) exam, all while offering an immersive experience and retro aesthetic. Enter Real commands correctly, move to the next host, and get a point. Can you get 100?
one-stop resource for all things offensive security.
Hack The Box CPTS, CBBH Exam and Lab Reporting / Note-Taking Tool
Proof of Concept (PoC) CVE-2021-4034
A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educational use only.
Automated exploitation of MSSQL servers at scale
A collection of resources I'm using while working toward the OSCP
Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration testing training.
Add a description, image, and links to the offsec topic page so that developers can more easily learn about it.
To associate your repository with the offsec topic, visit your repo's landing page and select "manage topics."