p3rzv41's repositories
evil-winrm
The ultimate WinRM shell for hacking/pentesting
OSCPRepo
A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' CherryTree. Reconscan Py2 and Py3. Custom ISO building.
breach-parse
A tool for parsing breached passwords
Buffer_Overflow
Don't let buffer overflows overflow your mind
CTF-Difficulty
This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
GTFOBins.github.io
Curated list of Unix binaries that can be exploited to bypass system security restrictions
Linux-Privilege-Escalation
This cheatsheet is aimed at the OSCP aspirants to help them understand the various methods of Escalating Privilege on Linux based Machines and CTFs with examples.
metasploit-framework
Metasploit Framework
PoC-in-GitHub
📡PoC auto collect from GitHub.
Privilege-Escalation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
privilege-escalation-awesome-scripts-suite
PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
public-pentesting-reports
Curated list of public penetration test reports released by several consulting firms and academic security groups
quark-engine
:shipit: A trust-worthy, practical tool that's ready to boost up your reverse engineering. https://twitter.com/quarkengine
routersploit
Exploitation Framework for Embedded Devices
RsaCtfTool
RSA attack tool (mainly for ctf) - retreive private key from weak public key and/or uncipher data
SMTPTester
small python3 tool to check common vulnerabilities in SMTP servers
social-engineer-toolkit
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
Web-Application-Cheatsheet
This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.