Hudson Woomer's starred repositories
OSCP-Notes-Template
A template Obsidian Vault for storing your OSCP revision notes
awesome-threat-detection
✨ A curated list of awesome threat detection and hunting resources 🕵️♂️
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
OSCP-EXAM-GUIDE
STEP BY STEP GUIDE FOR THE ROOTING (HACKING) OF A OSCP EXAM MACHINE LINKS AND TOOLS.
HackingAllTheThings
My documentation and tools for learn ethical hacking.
Linux-Privilege-Escalation-Resources
Compilation of Resources for TCM's Linux Privilege Escalation course
OSCPRepo
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' CherryTree. Reconscan Py2 and Py3. Custom ISO building.
maximum-awesome
Config files for vim and tmux.
ThreatHunter-Playbook
A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient.
Digital-Crime-Scene-Challenge
The object of the Digital Crime Scene Challenge is for participants to use their forensic and investigative skills to focus on potential digital evidence and conduct triage/analysis of such evidence.
Search-Replace-DB
This script was made to aid the process of migrating PHP and MySQL based websites. Works with most common CMSes.
FTK-imager-OSX
FTK Imager a Forensics Tools For MAC OS X
hadoop_framework
This is a prototype system that uses Hadoop to process hard drive images.
sleuthkit
The Sleuth Kit® (TSK) is a library and collection of command line digital forensics tools that allow you to investigate volume and file system data. The library can be incorporated into larger digital forensics tools and the command line tools can be directly used to find evidence.
autopsy
Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and other digital forensics tools. It can be used by law enforcement, military, and corporate examiners to investigate what happened on a computer. You can even use it to recover photos from your camera's memory card.
volatility
An advanced memory forensics framework