FULLSHADE / OSCELinks
Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation for the Offsec CTP/OSCE certification
☆146Updated 4 years ago
Alternatives and similar repositories for OSCE
Users that are interested in OSCE are comparing it to the libraries listed below
Sorting:
- OSEE Preparation☆189Updated 6 years ago
- ☆315Updated 3 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆151Updated 5 years ago
- ☆199Updated 7 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- collect for learning cases☆593Updated last year
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- A repository of previous info-sec presentations I've presented.☆162Updated 11 months ago
- esoteric☆54Updated 5 years ago
- Collection of resources for my preparation to take the OSEE certification.☆291Updated 5 years ago
- ☆269Updated 2 years ago
- POC for cve-2019-1458☆177Updated 3 years ago
- ☆137Updated 7 months ago
- Fork of mona.py with x64dbg support☆108Updated 3 years ago
- Vulnerability examples.☆410Updated last year
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆228Updated 6 years ago
- A bunch of my exploit development helper tools, collected in one place.☆143Updated 3 years ago
- ☆146Updated 5 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆77Updated 5 years ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆247Updated 5 years ago
- Linux Rootkits (4.x Kernel)☆86Updated 4 years ago
- Dll that can be used for side loading and other attack vector.☆202Updated 5 years ago
- Scripts I used during CTP☆68Updated 5 years ago
- x64 Windows Exploit Development☆114Updated last year
- Kernel Exploits☆260Updated 4 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆113Updated 5 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆190Updated 5 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Updated 2 months ago