0xbad53c / osed-toolsLinks
Tools/scripts I used/developed during the EXP-301 course.
☆21Updated 3 years ago
Alternatives and similar repositories for osed-tools
Users that are interested in osed-tools are comparing it to the libraries listed below
Sorting:
- ☆34Updated 3 years ago
- A collection of code snippets built to assist with breaking chains.☆123Updated last year
- A variety of AV evasion techniques written in C# for practice.☆96Updated 4 years ago
- Payload Generation Framework☆94Updated last year
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆66Updated 3 years ago
- Code dump from PEN-300/OSEP updated 2022☆41Updated 3 years ago
- A Python based ingestor for BloodHound☆85Updated 2 years ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆60Updated 3 years ago
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆69Updated 2 years ago
- A marriage between Octoberfest7/OSEP-Tools and chvancooten/OSEP-Code-Snippets with some improvements/additions☆75Updated 7 months ago
- AV Evasion Techniques☆79Updated 3 years ago
- generate payloads that force authentication against an attacker machine☆109Updated 2 years ago
- ☆88Updated 5 years ago
- SeRestorePrivilege to SYSTEM☆122Updated 3 years ago
- Attempt at Obfuscated version of SharpCollection☆221Updated last week
- ☆33Updated 2 years ago
- ☆95Updated 6 months ago
- A fast TCP/UDP tunnel over HTTP☆22Updated 7 months ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆21Updated last year
- Interract with Microsoft SQL Server (MS SQL | MSSQL) servers and their linked instances in restricted environments, without the need for …☆36Updated 3 months ago
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆86Updated 3 years ago
- CLI monitor for windows process- & file activity☆89Updated 4 years ago
- SeManageVolumePrivilege to SYSTEM☆131Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆139Updated 5 months ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 7 months ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆285Updated last year
- rcat☆69Updated 3 years ago
- ☆68Updated 3 weeks ago
- ☆69Updated 7 months ago
- ☆212Updated last year