|
| 1 | +. |
| 2 | +├── Active-Directory-Fun |
| 3 | +├── Awesome-Advanced-Windows-Exploitation-References |
| 4 | +├── Awesome-Hacking-Resources |
| 5 | +├── AwesomeXSS |
| 6 | +│ └── Database |
| 7 | +├── Books |
| 8 | +├── Bypassing-Web-Application-Firewalls |
| 9 | +├── ctf |
| 10 | +│ └── natas |
| 11 | +├── escalationserver |
| 12 | +├── Hydra-Cheatsheet |
| 13 | +├── IntruderPayloads |
| 14 | +│ ├── BurpAttacks |
| 15 | +│ ├── FuzzLists |
| 16 | +│ ├── Plugins |
| 17 | +│ └── Uploads |
| 18 | +├── Linux-Privilege-Escalation |
| 19 | +├── metasploit scripts |
| 20 | +├── MSF-Venom-Cheatsheet |
| 21 | +├── Notes VA |
| 22 | +│ └── lpeworkshop |
| 23 | +├── Offensive-Security-OSCP-Cheatsheets |
| 24 | +│ ├── ctfs-walkthroughs |
| 25 | +│ ├── lab |
| 26 | +│ ├── memory-forensics |
| 27 | +│ ├── offensive-security |
| 28 | +│ └── offensive-security-experiments |
| 29 | +├── oscp |
| 30 | +│ ├── recon_enum |
| 31 | +│ ├── reports |
| 32 | +│ └── templates |
| 33 | +├── OSCP-Materials-master |
| 34 | +│ ├── Cheat Sheets |
| 35 | +│ ├── Linux Privilege Escalation and Post Exploitation |
| 36 | +│ ├── Metasploit-Meterpreter-Msfvenom |
| 37 | +│ ├── PASSWORD CRACKING and Usefull TOOLS and Commands |
| 38 | +│ ├── SHELLCODE and Buffer Over Flow |
| 39 | +│ ├── Understand Privilege Escalation |
| 40 | +│ └── Window Privilege Escalation and Post Exploitation |
| 41 | +├── OSCPRepo |
| 42 | +│ ├── CheetSheets |
| 43 | +│ ├── KeepNotes |
| 44 | +│ ├── lists |
| 45 | +│ ├── Local Info Enum |
| 46 | +│ ├── PDFs&Documents |
| 47 | +│ ├── Priv Esc Checks |
| 48 | +│ ├── Process&Methodology |
| 49 | +│ ├── Reporting |
| 50 | +│ ├── Scanning&Recon |
| 51 | +│ ├── scripts |
| 52 | +│ └── Tools |
| 53 | +├── PayloadsAllTheThings |
| 54 | +│ ├── AWS Amazon Bucket S3 |
| 55 | +│ ├── Command Injection |
| 56 | +│ ├── CRLF Injection |
| 57 | +│ ├── CSRF Injection |
| 58 | +│ ├── CSV Injection |
| 59 | +│ ├── CVE Exploits |
| 60 | +│ ├── Directory Traversal |
| 61 | +│ ├── File Inclusion |
| 62 | +│ ├── GraphQL Injection |
| 63 | +│ ├── Insecure Deserialization |
| 64 | +│ ├── Insecure Direct Object References |
| 65 | +│ ├── Insecure Management Interface |
| 66 | +│ ├── Insecure Source Code Management |
| 67 | +│ ├── JSON Web Token |
| 68 | +│ ├── LaTeX Injection |
| 69 | +│ ├── LDAP Injection |
| 70 | +│ ├── Methodology and Resources |
| 71 | +│ ├── NoSQL Injection |
| 72 | +│ ├── OAuth |
| 73 | +│ ├── Open Redirect |
| 74 | +│ ├── SAML Injection |
| 75 | +│ ├── Server Side Request Forgery |
| 76 | +│ ├── Server Side Template Injection |
| 77 | +│ ├── SQL Injection |
| 78 | +│ ├── _template_vuln |
| 79 | +│ ├── Type Juggling |
| 80 | +│ ├── Upload Insecure Files |
| 81 | +│ ├── Web Cache Deception |
| 82 | +│ ├── Web Sockets |
| 83 | +│ ├── XPATH Injection |
| 84 | +│ ├── XSS Injection |
| 85 | +│ └── XXE Injection |
| 86 | +├── penbook |
| 87 | +│ ├── assets |
| 88 | +│ ├── physical_access_to_machine |
| 89 | +│ ├── styles |
| 90 | +│ └── writeups |
| 91 | +├── pentestbook |
| 92 | +│ ├── assets |
| 93 | +│ ├── physical_access_to_machine |
| 94 | +│ ├── styles |
| 95 | +│ └── writeups |
| 96 | +├── pentest_compilation |
| 97 | +├── Powershell-Cheatsheet |
| 98 | +├── pronotes |
| 99 | +├── python-pty-shells-master |
| 100 | +├── Red-Team-Infrastructure-Wiki |
| 101 | +│ └── images |
| 102 | +├── resource-threat-hunting |
| 103 | +├── SCADA PLC ICS Pentest PDFs |
| 104 | +│ └── awesome-industrial-control-system-security |
| 105 | +├── SecLists |
| 106 | +│ ├── Discovery |
| 107 | +│ ├── Fuzzing |
| 108 | +│ ├── IOCs |
| 109 | +│ ├── Miscellaneous |
| 110 | +│ ├── Passwords |
| 111 | +│ ├── Pattern-Matching |
| 112 | +│ ├── Payloads |
| 113 | +│ ├── Usernames |
| 114 | +│ └── Web-Shells |
| 115 | +├── security-cheatsheets |
| 116 | +├── Web-CTF-Cheatsheet |
| 117 | +│ └── scripts |
| 118 | +├── Windows-Privilege-Escalation |
| 119 | +└── xapax.github.io |
| 120 | + ├── css |
| 121 | + ├── img |
| 122 | + ├── js |
| 123 | + └── reveng |
| 124 | + |
| 125 | +122 directories |
0 commit comments