Mark Gillanders's repositories
Awesome-PenTest-Practice
Hackthebox, Vulnhub, TryHackMe and Real World PenTest
btlejack
Bluetooth Low Energy Swiss-army knife
Buffer_Overflow
Don't let buffer overflows overflow your mind
bugcrowd_university
Open source education content for the researcher community
CEH-v10-Study-Guide
Study Guide for CEH v10 exam
cehV10
CEHv10 notes
CEHv10-Notes
:closed_book: Both personal and public notes for EC-Council's CEHv10 312-50, because it's thousands of pages/slides of boredom, and a braindump to many
cissp
CISSP Study Materials
CISSP-Oreilly-Case
A list of content for the OReilly
CISSP-Oreilly-SSE
System Security Engineering
crits
CRITs - Collaborative Research Into Threats
CTF-notes
Everything needed for doing CTFs
dnsenum
dnsenum is a perl script that enumerates DNS information
docker-pupy
Docker setup for Pupy
GRASSMARLIN
Provides situational awareness of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks in support of network security assessments. #nsacyber
Hashcat-Cheatsheet
Hashcat Cheatsheet for OSCP
ImmunityDebugger
ImmunityDebugger
interview
Everything you need to prepare for your technical interview
LOIC
Low Orbit Ion Cannon - An open source network stress tool, written in C#. Based on Praetox's LOIC project. USE ON YOUR OWN RISK. WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES.
lpeworkshop
Windows / Linux Local Privilege Escalation Workshop
OSCPRepo
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' CherryTree. Reconscan Py2 and Py3. Custom ISO building.
PowerSploit
PowerSploit - A PowerShell Post-Exploitation Framework
python-pentest-tools
Python tools for penetration testers
RFCrack
A Software Defined Radio Attack Tool
SharpUp
SharpUp is a C# port of various PowerUp functionality.
TJ-JPT
This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used in Joplin
top10webseclist
Top Ten Web Hacking Techniques List
Watson
Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities