Skip to content
View jwardsmith's full-sized avatar

Block or report jwardsmith

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
jwardsmith/README.md

James Ward-Smith

jwardsmith

jwardsmith

Connect with me:

james-ward-smith-ab5868140

Languages and Tools:

python python bash c

jwardsmith

Pinned Loading

  1. Red-Team-Scripts Red-Team-Scripts Public

    Collection of red team scripts, resources & configs.

    PowerShell 10 4

  2. Blue-Team-Scripts Blue-Team-Scripts Public

    Collection of blue team scripts, resources & configs.

    AutoIt 5

  3. OSCP-Methodology OSCP-Methodology Public

    This repository outlines my OSCP-focused methodology, specifically targeting common port numbers encountered during penetration testing. The goal is to provide a structured approach to identifying …

    21 3

  4. Active-Directory-Exploitation Active-Directory-Exploitation Public

    This cheatsheet contains Active Directory (AD) exploitation techniques, showcasing methods used to identify and abuse misconfigurations or weaknesses within AD environments.

    40 15

  5. Penetration-Testing Penetration-Testing Public

    This cheatsheet contains techniques, commands, and tools commonly used during penetration tests. It covers various stages of penetration testing, including enumeration, exploitation, lateral moveme…

    5 3

  6. Bug-Bounty Bug-Bounty Public

    This cheatsheet contains techniques, commands, and tools commonly used during web application penetration tests. It provides quick references to common vulnerabilities, exploitation techniques, and…

    1