OSCP-BoF VS try-harder

Compare OSCP-BoF vs try-harder and see what are their differences.

OSCP-BoF

This is a walkthrough about understanding the #BoF machine present in the #OSCP exam. (by 3isenHeiM)

try-harder

"Try Harder" is a cybersecurity retro game designed to simulate 100 real-world scenarios that will help you prepare for the Offensive Security Certified Professional (OSCP) exam, all while offering an immersive experience and retro aesthetic. Enter Real commands correctly, move to the next host, and get a point. Can you get 100? (by milosilo)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
OSCP-BoF try-harder
2 2
64 151
- -
0.0 5.2
almost 3 years ago 8 months ago
Python Python
GNU General Public License v3.0 only -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

OSCP-BoF

Posts with mentions or reviews of OSCP-BoF. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2021-06-03.

What are some alternatives?

When comparing OSCP-BoF and try-harder you can also consider the following projects:

dostackbufferoverflowgood

hack_hard - A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard

SUID3NUM - A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)

Pokemanki - Catch and train Pokémon as you learn with Anki

zenith - Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.

gh0stbust3rz - Build a C2 system while becoming a techie Gh0stbust3r! Learn real-world RedTeam skills and even earn a basic c2 by completing the game

raptor_infiltrate20 - #INFILTRATE20 raptor's party pack.

gamefinder - Gamefinder automates monitoring the Ebay API for gaming related items, providing visual and audible notifications of new items and gives you a significant advantage over manually monitoring the website for new gaming items.

TireFire - Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortable GUI-ish platform. Great for OSCP/HTB type Machines as well as penetration testing.

SUDO_KILLER - A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.

Interlace - Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.

Win7Blue - Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits