FULLSHADE / OSCELinks
Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation for the Offsec CTP/OSCE certification
☆143Updated 3 years ago
Alternatives and similar repositories for OSCE
Users that are interested in OSCE are comparing it to the libraries listed below
Sorting:
- OSEE Preparation☆181Updated 6 years ago
- ☆307Updated 3 years ago
- Collection of things made during my preparation to take on OSEE☆98Updated 5 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆141Updated 3 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- ☆192Updated 7 years ago
- ☆265Updated last year
- A bunch of my exploit development helper tools, collected in one place.☆142Updated 2 years ago
- A repository of previous info-sec presentations I've presented.☆161Updated 7 months ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆148Updated 5 years ago
- Dll that can be used for side loading and other attack vector.☆201Updated 4 years ago
- collect for learning cases☆585Updated last year
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- Collection of resources for my preparation to take the OSEE certification.☆280Updated 4 years ago
- Bring your own print driver privilege escalation tool☆252Updated 3 years ago
- esoteric☆54Updated 4 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆128Updated 2 years ago
- ☆146Updated 5 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆246Updated 4 years ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆124Updated 4 years ago
- ☆185Updated last year
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆222Updated 2 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- POC for cve-2019-1458☆175Updated 3 years ago
- a tool to make it easy and fast to test various forms of injection☆173Updated 6 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆188Updated 4 years ago
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆225Updated 5 years ago
- A personalized/enhanced re-creation of the Darkhotel "Double Star" APT exploit chain with a focus on Windows 8.1 and mixed with some of m…☆146Updated 3 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆119Updated 2 years ago