Pentest-Service-Enumeration
awesome-oscp
Pentest-Service-Enumeration | awesome-oscp | |
---|---|---|
5 | 1 | |
93 | 2,413 | |
- | - | |
6.5 | 1.0 | |
8 months ago | 7 days ago | |
Shell | ||
GNU General Public License v3.0 only | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Pentest-Service-Enumeration
-
OSCP Notes Recon
Checkout Pentest Service Enumeration, you tell the tool what protocol you are testing and it gives you a list of commands to try. You can add your own commands to make the tool more useful.
-
Exam this weekend
I created this tool to help me when trying to figure out what to do next. https://github.com/ssstonebraker/Pentest-Service-Enumeration
- recommended tools that do not come with Kali
- Pentest Service Enumeration Tool
awesome-oscp
What are some alternatives?
linux-smart-enumeration - Linux enumeration tool for pentesting and CTFs with verbosity levels
OSCP-Exam-Report-Template-Markdown - :orange_book: Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
EZEA - EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces
kashz-jewels - Gitbook: kashz-Jewels
lava - A Software Framework for Neuromorphic Computing
PWK-OSCP-Preparation-Roadmap - Roadmap for preparing for OSCP, anyone is free to use this, and also feedback and contributions are welcome
dirsearch - Web path scanner
the_cyber_plumbers_handbook - Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
deepce - Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
SUDO_KILLER - A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.