Exploit Development CheatSheet.
☆18Aug 9, 2021Updated 4 years ago
Alternatives and similar repositories for OSED-CheatSheet
Users that are interested in OSED-CheatSheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 4 years ago
- A curated list of resources for the OSED journey.☆72Feb 3, 2022Updated 4 years ago
- ☆18Feb 12, 2022Updated 4 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆25Jun 29, 2021Updated 4 years ago
- This tool is used to generate Offensive Security Exploit Developer (OSED) exam report. This is a modified version of https://github.com/n…☆14Jan 19, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆14Oct 18, 2023Updated 2 years ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 6 years ago
- Some of my personal notes that helped me pass the OSWP☆60May 15, 2022Updated 3 years ago
- Static malware analysis using python☆12Jun 22, 2018Updated 7 years ago
- NX Launcher+ is a Nintendo Switch-looking game and app launcher for Windows! (not mantained anymore)☆11Feb 17, 2022Updated 4 years ago
- ☆11Nov 14, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- Deeply Embeddable bare-metal C++ standard library☆12Feb 16, 2025Updated last year
- vulnerable windows binaries for exploitation practice☆47Jun 6, 2022Updated 3 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- PyTorch Implementation for the paper "Let Me Help You! Neuro-Symbolic Short-Context Action Anticipation" accepted to RA-L'24.☆12Nov 27, 2024Updated last year
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14May 29, 2021Updated 4 years ago
- Collection of reverse engineering utility scripts for the Horizon Kernel☆16Jan 11, 2023Updated 3 years ago
- My customized docker image used for binary exploitation and RE☆14Jul 3, 2021Updated 4 years ago
- A collection of headers containing useful tools and gadgets for building C++ programs☆11Feb 26, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- This contains Helpful PYKD (Python Extension for Windbg) scripts☆49Mar 9, 2015Updated 11 years ago
- JTAG debugging support for Allwinner SoCs☆10Mar 4, 2026Updated 3 weeks ago
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- DCS World Mod Manager☆11May 21, 2025Updated 10 months ago
- ☆14Aug 25, 2022Updated 3 years ago
- This repo represents work the Phantom Community collaborates on to build apps and learn.☆13May 18, 2021Updated 4 years ago
- ☆10Oct 1, 2023Updated 2 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆14Jul 26, 2025Updated 7 months ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago
- A BASH script to automate simple tasks related to static malware analysis☆12Oct 2, 2020Updated 5 years ago
- tp-link Decrypt/Crypt Config files☆15Oct 25, 2022Updated 3 years ago
- SLE 4442 smartcard emulation on an AVR☆14Apr 20, 2020Updated 5 years ago
- BurpSuite Extension for performing scan via CLI.☆14Dec 5, 2017Updated 8 years ago
- A powerful Windows UI monitoring and DNS exfiltration tool written in Rust, combining advanced UI event capture capabilities with secure …☆19Mar 6, 2025Updated last year