Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
EZEA Alternatives
Similar projects and alternatives to EZEA
-
AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
-
OSCP-Exam-Report-Template
Modified template for the OSCP Exam and Labs. Used during my passing attempt
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
-
SUDO_KILLER
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
-
Pentest-Service-Enumeration
Suggests programs to run against services found during the enumeration phase of a Pentest
-
RELY
RELY (Name composed on project members Romy, Esther, Lucille and Yassir) is a python tool developed to help a Digital Forensics Triage procedure on some Microsoft Windows devices.
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
Lockdoor-Framework
🔐 Lockdoor Framework : A Penetration Testing framework with Cyber Security Resources
-
EZEA reviews and mentions
- I passed OSCP, and here is how you should(nt) do it
-
5/5 full compromise. Rick Rolled the proctor. 😂
Congrats bro, I personally like notion. And use tilix for terminal segmention. Made a bash script for enumeration: https://github.com/yassirlaaouissi/EZEA
-
Exam in 1 week, any last tips
I have my exam on thr 6th of june, 09:00, amsterdam time. I have the entire public PWK network done, 25 hackthebox machines from TJ Nulls list, 10 BOF machines, an automated enum tool (https://github.com/yassirlaaouissi/EZEA), all of my notes and a healthy amount of failure anxiety for the OSCP Exam. Did most of the boxes without hints, the 5 big ones and some hackthebox machines mostly needed hints on initial foothold for me.
-
Exam in <24 hours - Planning to fail. What do I do, study, or at least research?
I made a nice enum tool, use it: https://github.com/yassirlaaouissi/EZEA
-
Mid OSCP Update #2
The first two weeks of my labtime went to the course material (PDF and video). After that I spent a week or two on making an enumeration tool: https://github.com/yassirlaaouissi/EZEA
-
Tips and resources on pentesting methodology?
Many people make tools based on steps in the methodology. I've made a tool to auromate the enumeration step: https://github.com/yassirlaaouissi/EZEA
-
Just Failed First Attempt - BOF, and then NOTHING - HUH?
This is kinda self advertising, but trust me. It will save you time; I use this tool to enumerate my targets. Have done around 30 PWK boxes and 7 HTB machines with it so far: https://github.com/yassirlaaouissi/EZEA
-
Mid OSCP Update
I have been using my enumeration tool EZEA (https://github.com/yassirlaaouissi/EZEA), and so far I am not disappointed I spent time on it. If anyone has suggestions on how to make this tool better, or on how to practice buffer overflows, please do tell me. Have a nice day!
-
Made a nice OSCP enum tool
Made this tool based on several other tools that can simplify the enumeration proces for OSCP-like environments. Have rooted 8 boxes so far using this tool in 2 weeks time. Here is the link, let me know how you feel about it: https://github.com/yassirlaaouissi/EZEA
-
OSCP tips: Enumeration + time management
I've made an automatic enumerator for myself to prevent timeloss typing all commands from scratch during OSCP. Here it is, let me know what you think about it: https://github.com/yassirlaaouissi/EZEA
-
A note from our sponsor - InfluxDB
www.influxdata.com | 18 Apr 2024
Stats
yassirlaaouissi/EZEA is an open source project licensed under GNU General Public License v3.0 only which is an OSI approved license.
The primary programming language of EZEA is Shell.