FULLSHADE / OSCELinks
Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation for the Offsec CTP/OSCE certification
☆146Updated 4 years ago
Alternatives and similar repositories for OSCE
Users that are interested in OSCE are comparing it to the libraries listed below
Sorting:
- OSEE Preparation☆192Updated 6 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- ☆317Updated 3 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆152Updated 6 years ago
- ☆199Updated 8 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- collect for learning cases☆595Updated last year
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- A repository of previous info-sec presentations I've presented.☆163Updated last year
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30Updated 5 years ago
- ☆272Updated 2 years ago
- esoteric☆56Updated 5 years ago
- Collection of resources for my preparation to take the OSEE certification.☆303Updated 5 years ago
- ☆138Updated last month
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆227Updated 6 years ago
- POC for cve-2019-1458☆177Updated 4 years ago
- Vulnerability examples.☆412Updated last year
- A bunch of my exploit development helper tools, collected in one place.☆145Updated 3 years ago
- Fork of mona.py with x64dbg support☆109Updated 3 years ago
- x64 Windows Exploit Development☆116Updated last year
- Linux Rootkits (4.x Kernel)☆86Updated 4 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆148Updated 3 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆249Updated 5 years ago
- Exploit Development, Reverse Engineering & Cryptography☆257Updated 4 months ago
- ☆145Updated 6 years ago
- Dll that can be used for side loading and other attack vector.☆203Updated 5 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 6 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆235Updated 2 years ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆97Updated last year
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆133Updated 2 years ago