Cipher7 / OSEPLinks
My Personal Notes of OSEP
☆38Updated 2 years ago
Alternatives and similar repositories for OSEP
Users that are interested in OSEP are comparing it to the libraries listed below
Sorting:
- ☆71Updated 6 months ago
- ☆38Updated 3 years ago
- A repository with my code snippets for research/education purposes.☆51Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 2 years ago
- Code dump from PEN-300/OSEP updated 2022☆42Updated 3 years ago
- ☆119Updated 5 months ago
- A Python based ingestor for BloodHound☆85Updated 2 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆49Updated last year
- ☆24Updated 3 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆106Updated 2 years ago
- AV Evasion Techniques☆79Updated 3 years ago
- Get SYSTEM via SeDebugPrivilege☆21Updated 3 years ago
- A collection of Cobalt Strike Aggressor scripts.☆102Updated 3 years ago
- ☆90Updated 7 months ago
- ☆59Updated 10 months ago
- ☆60Updated 2 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆145Updated last year
- Payload Generation Framework☆19Updated 10 months ago
- An open-source process injection enumeration tool written in C#☆173Updated 2 years ago
- Just some random Red Team Scripts that can be useful☆154Updated last year
- ☆38Updated 2 years ago
- ☆47Updated 3 years ago
- Situational Awareness script to identify how and where to run implants☆65Updated 9 months ago
- PowerShell Reverse Shell☆79Updated 2 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆46Updated 5 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆21Updated last year
- D/Invoke standalone shellcode runners☆39Updated last year
- ☆19Updated 3 years ago
- Utilities for obfuscating shellcode☆91Updated last week
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated 2 years ago