Comprehensive tutorial on modern exploitation techniques with a focus on understanding exploitation from scratch.
Offensive Docker is an image with the most commonly used tools for creating a pentest environment easily and quickly. It includes a variety of tools for port scanning, recon, subdomain takeover, DNS lookups, screenshot, crawling, directory search, fuzzing, web scanning, CMS search, JS analysis, wordlists, Git repository scanning, mobile testing, brute force, cracking, OS enumeration, exploits, Windows reverse shell, forensic analysis, custom functions, reporting tools, and more. It also provides detailed instructions on how to launch it in a VPS on Google Cloud Platform or Digital Ocean.
Comprehensive tutorial on modern exploitation techniques with a focus on understanding exploitation from scratch.
Create a vulnerable active directory for testing various Active Directory attacks.
Tool for randomizing Cobalt Strike Malleable C2 profiles to evade static, signature-based detection controls.
A standard for conducting penetration tests, covering seven main sections from planning to reporting.
Charlotte is an undetected C++ shellcode launcher for executing shellcode with stealth.
A collection of payloads and methodologies for web pentesting.