awesome-oscp
Pentest-Service-Enumeration
Our great sponsors
awesome-oscp | Pentest-Service-Enumeration | |
---|---|---|
1 | 5 | |
2,398 | 93 | |
- | - | |
3.3 | 6.5 | |
7 months ago | 8 months ago | |
Shell | ||
- | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
awesome-oscp
Pentest-Service-Enumeration
-
OSCP Notes Recon
Checkout Pentest Service Enumeration, you tell the tool what protocol you are testing and it gives you a list of commands to try. You can add your own commands to make the tool more useful.
-
Exam this weekend
I created this tool to help me when trying to figure out what to do next. https://github.com/ssstonebraker/Pentest-Service-Enumeration
- recommended tools that do not come with Kali
- Pentest Service Enumeration Tool
What are some alternatives?
OSCP-Exam-Report-Template-Markdown - :orange_book: Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
linux-smart-enumeration - Linux enumeration tool for pentesting and CTFs with verbosity levels
kashz-jewels - Gitbook: kashz-Jewels
EZEA - EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces
PWK-OSCP-Preparation-Roadmap - Roadmap for preparing for OSCP, anyone is free to use this, and also feedback and contributions are welcome
lava - A Software Framework for Neuromorphic Computing
the_cyber_plumbers_handbook - Free copy of The Cyber Plumber's Handbook - The definitive guide to Secure Shell (SSH) tunneling, port redirection, and bending traffic like a boss.
dirsearch - Web path scanner
SUDO_KILLER - A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
deepce - Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
OSCP-Exam-Report-Template - Modified template for the OSCP Exam and Labs. Used during my passing attempt
lava - Microsoft Azure Exploitation Framework