Outils d'utilisateurs

Outils du Site


oscp_pwk

Différences

Cette page vous donne les différences entre la révision choisie et la version actuelle de la page.

Lien vers cette vue

oscp_pwk [2020/08/18 15:53]
M0N5T3R
oscp_pwk [2023/03/29 16:22] (Version actuelle)
M0N5T3R
Ligne 1: Ligne 1:
 **OSCP tools** **OSCP tools**
  
-https://github.com/rkhal101/nmapAutomator +SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase. It allows the tester to save time by having point-and-click access to his toolkit and by displaying all tool output in a convenient way. If little time is spent setting up commands and tools, more time can be spent focusing on analysing results. 
-./nmapAutomator.sh 10.10.10.01 All+https://sparta.secforce.com/ 
 + 
 + 
 +A reconnaissance tool made for the OSCP engagements to automate information gathering and service enumeration whilst creating a directory structure to store results, findings and exploits used for each host.. https://github.com/mikaelkall/massrecon 
 + 
 + 
 + 
 +A reconnaissance tool made for the OSCP labs to automate information gathering and service enumeration whilst creating a directory structure to store results, findings and exploits used for each host, recommended commands to execute and directory structures for storing loot and flagshttps://github.com/codingo/Reconnoitre 
 + 
 + 
 +The main goal for this script is to automate all of the process of recon/enumeration that is run every time, and instead focus our attention on real pen testing https://github.com/rkhal101/nmapAutomator 
  
  
Ligne 12: Ligne 23:
  
 Usefull list of Hacking Windows tools https://xz.aliyun.com/t/6498 Usefull list of Hacking Windows tools https://xz.aliyun.com/t/6498
 +
 +
  
 **OSCP notes** **OSCP notes**
 +
 +https://github.com/sphinxs329/OSCP-PWK-Notes-Public
 +
 +https://github.com/tbowman01/OSCP-PWK-Notes-Public
  
 http://hackingandsecurity.blogspot.ca/2016/04/oscp-related-notes.html http://hackingandsecurity.blogspot.ca/2016/04/oscp-related-notes.html
Ligne 54: Ligne 71:
 https://github.com/OlivierLaflamme/Cheatsheet-God https://github.com/OlivierLaflamme/Cheatsheet-God
  
 +https://github.com/akenofu/OSCP-Cheat-Sheet
 +
 +https://github.com/mohitkhemchandani/OSCP_BIBLE
  
  
Ligne 66: Ligne 86:
  
 OSCP preparation - Buffer Overflows for OSCP https://appsecradar.net/posts/simplifying-buffer-overflows-for-oscp/ OSCP preparation - Buffer Overflows for OSCP https://appsecradar.net/posts/simplifying-buffer-overflows-for-oscp/
 +https://github.com/V1n1v131r4/OSCP-Buffer-Overflow
  
 OSCP preparation https://github.com/RihaMaheshwari/OSCP-Preparation-Material OSCP preparation https://github.com/RihaMaheshwari/OSCP-Preparation-Material
Ligne 97: Ligne 118:
 OSCP-like Vulnhub/HTB VMs OSCP-like Vulnhub/HTB VMs
 http://www.netmux.com/blog/purple-rain-attack http://www.netmux.com/blog/purple-rain-attack
 +
 +OSCP like VM for the exam (set of 5 VMs)
 +https://github.com/ajdumanhug/oscp-practice
  
  
oscp_pwk.1597758809.txt.gz · Dernière modification: 2020/08/18 15:53 par M0N5T3R