Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation for the Offsec CTP/OSCE certification
☆144Aug 4, 2021Updated 4 years ago
Alternatives and similar repositories for OSCE
Users that are interested in OSCE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Resources for Windows exploit development☆1,652Dec 20, 2021Updated 4 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Sep 9, 2020Updated 5 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- ☆317Apr 8, 2022Updated 4 years ago
- Collection of things made during my preparation to take on OSCE☆189Feb 24, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆237Aug 21, 2020Updated 5 years ago
- OSEE Preparation☆192Feb 15, 2019Updated 7 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64May 31, 2020Updated 5 years ago
- Exploit Development - Weaponized Exploit and Proof of Concepts (PoC)☆234Jun 22, 2023Updated 2 years ago
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- x64 Windows Exploit Development☆116Aug 24, 2024Updated last year
- Clone running process with ZwCreateProcess☆59Nov 8, 2020Updated 5 years ago
- My walkthrough of the LPEWorkshop exercises☆36Aug 17, 2020Updated 5 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Some exploits, which I’ve created during my OSCE preparation.☆81Jul 7, 2018Updated 7 years ago
- Kernel Exploits☆259Jul 18, 2021Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Oct 3, 2021Updated 4 years ago
- ☆780Oct 17, 2023Updated 2 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,992Feb 24, 2025Updated last year
- Alphanumeric Shellcode (x86) Encoder☆75Feb 24, 2022Updated 4 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆609Jul 15, 2024Updated last year
- Collection of resources for my preparation to take the OSEE certification.☆310Sep 9, 2020Updated 5 years ago
- List of Awesome Advanced Windows Exploitation References☆1,560Jan 13, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Token Privilege Research☆878Sep 1, 2017Updated 8 years ago
- Code and exercises for a workshop on z3 and angr☆235Dec 29, 2020Updated 5 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆938Jan 6, 2025Updated last year
- Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.☆50Aug 31, 2020Updated 5 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 7 years ago
- ☆198Feb 14, 2024Updated 2 years ago
- A collection of links related to VMware escape exploits☆1,492Sep 4, 2024Updated last year
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆1,629Jul 10, 2023Updated 2 years ago
- Windows System Programming Experiments☆221Jun 13, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Using DInvoke to patch AMSI.dll in order to bypass AMSI detections triggered when loading .NET tradecraft via Assembly.Load().☆219Mar 5, 2020Updated 6 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆214Jul 2, 2020Updated 5 years ago
- Loads any C# binary in mem, patching AMSI + ETW.☆844Oct 3, 2021Updated 4 years ago
- ☆201Jan 1, 2018Updated 8 years ago
- Solutions and write-ups to challenges from Pwny Racing☆24Jan 30, 2020Updated 6 years ago
- ☆99Dec 9, 2021Updated 4 years ago
- Collection of things made during my preparation to take on OSEE☆103Jul 30, 2019Updated 6 years ago