#ruby #exam #latex #markdown #markdown_template #markdown_to_pdf #offensive_security #oscp #oscp_prep #pandoc #report #reporting_tool
https://github.com/noraj/OSCP-Exam-Report-Template-Markdown
https://github.com/noraj/OSCP-Exam-Report-Template-Markdown
GitHub
GitHub - noraj/OSCP-Exam-Report-Template-Markdown: :orange_book: Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE…
:orange_book: Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report - noraj/OSCP-Exam-Report-Template-Markdown
#powershell #offensive_security #oscp #pentesting #redteam #redteam_infrastructure #redteaming
https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques
https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques
GitHub
GitHub - mantvydasb/RedTeaming-Tactics-and-Techniques: Red Teaming Tactics and Techniques
Red Teaming Tactics and Techniques. Contribute to mantvydasb/RedTeaming-Tactics-and-Techniques development by creating an account on GitHub.
#python #cyber_security #cybersecurity #hacking #hacking_code #hacking_tool #hacking_tools #hackingtools #keylog #keyloger #keylogger #keylogger_analysis #keylogger_screenshot #keylogging #keylogs #offensive_scripts #offensive_security #python_hacking #python_tools #python3
https://github.com/aydinnyunus/Keylogger
https://github.com/aydinnyunus/Keylogger
GitHub
GitHub - aydinnyunus/Keylogger: Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail.
Get Keyboard,Mouse,ScreenShot,Microphone Inputs from Target Computer and Send to your Mail. - aydinnyunus/Keylogger
#python #exploitation #offensive #ose #exploitdev #exploitation_course
https://github.com/ashemery/exploitation-course
https://github.com/ashemery/exploitation-course
GitHub
GitHub - ashemery/exploitation-course: Offensive Software Exploitation Course
Offensive Software Exploitation Course. Contribute to ashemery/exploitation-course development by creating an account on GitHub.
#batchfile #ioc #guide #cybersecurity #ransomware #infosec #pentesting #offensive_security #cobalt_strike #pentest_scripts #mitigation #ransomware_detection #redteaming #pentesting_tools
https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak
https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak
GitHub
GitHub - ForbiddenProgrammer/conti-pentester-guide-leak: Leaked pentesting manuals given to Conti ransomware crooks
Leaked pentesting manuals given to Conti ransomware crooks - ForbiddenProgrammer/conti-pentester-guide-leak
#python #c2 #cybersecurity #hacking #hacking_tool #offensive_security #open_source #penetration_testing #penetration_testing_tools #pentest #pentesting #readteaming #redteam #redteam_tools
https://github.com/t3l3machus/Villain
https://github.com/t3l3machus/Villain
GitHub
GitHub - t3l3machus/Villain: Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based…
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and ...
#cplusplus #arduino #beacon #bluetooth #command_line #deauth #deauthentication #deauthentication_attack #defensive #esp32 #esp32_s2 #esp8266 #espressif #firmware #flipper_zero #flipperzero #iot #offensive #scanner #spammer #wifi
https://github.com/justcallmekoko/ESP32Marauder
https://github.com/justcallmekoko/ESP32Marauder
GitHub
GitHub - justcallmekoko/ESP32Marauder: A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32
A suite of WiFi/Bluetooth offensive and defensive tools for the ESP32 - justcallmekoko/ESP32Marauder
#python #blueteam #bugbounty #cheatsheet #credentials_gathering #cybersecurity #default_password #exploit #infosec #offensive_security #pentest #pentesting
https://github.com/ihebski/DefaultCreds-cheat-sheet
https://github.com/ihebski/DefaultCreds-cheat-sheet
GitHub
GitHub - ihebski/DefaultCreds-cheat-sheet: One place for all the default credentials to assist the Blue/Red teamers identifying…
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️ - ihebski/DefaultCreds-cheat-sheet
#go #ai_agents #ai_security_tool #anthropic #autonomous_agents #golang #gpt #graphql #multi_agent_system #offensive_security #open_source #openai #penetration_testing #penetration_testing_tools #react #security_automation #security_testing #security_tools #self_hosted
PentAGI is an AI-powered tool that automates penetration testing with smart agents using 20+ pro tools like nmap and metasploit in a safe Docker sandbox. It researches vulnerabilities, executes attacks, stores knowledge for reuse, and creates detailed reports via a simple web UI. Quick setup needs Docker, an LLM API key (OpenAI/Anthropic), and `docker compose up -d`. This saves you hours of manual work, speeds up secure testing, cuts errors, and helps find issues faster for better protection.
https://github.com/vxcontrol/pentagi
PentAGI is an AI-powered tool that automates penetration testing with smart agents using 20+ pro tools like nmap and metasploit in a safe Docker sandbox. It researches vulnerabilities, executes attacks, stores knowledge for reuse, and creates detailed reports via a simple web UI. Quick setup needs Docker, an LLM API key (OpenAI/Anthropic), and `docker compose up -d`. This saves you hours of manual work, speeds up secure testing, cuts errors, and helps find issues faster for better protection.
https://github.com/vxcontrol/pentagi
GitHub
GitHub - vxcontrol/pentagi: ✨ Fully autonomous AI Agents system capable of performing complex penetration testing tasks
✨ Fully autonomous AI Agents system capable of performing complex penetration testing tasks - vxcontrol/pentagi