Gabb4r / osedLinks
OSED course preparation materials.
☆12Updated 4 years ago
Alternatives and similar repositories for osed
Users that are interested in osed are comparing it to the libraries listed below
Sorting:
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆46Updated last year
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆21Updated 3 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 4 years ago
- vulnerable windows binaries for exploitation practice☆40Updated 3 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆18Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆29Updated 6 years ago
- IAT Unhooking proof-of-concept☆29Updated last year
- ☆37Updated 5 months ago
- Exploits written while preparing for the OSED exam☆21Updated last year
- Info related to the Outflank training: Microsoft Office Offensive Tradecraft☆52Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆39Updated last year
- Brief writeup of post exploitation methodologies.☆18Updated last year
- in-process powershell runner for BRC4☆45Updated last year
- ☆38Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated last year
- A more reliable way of resolving syscall numbers in Windows☆49Updated last year
- ☆59Updated last year
- Create Anti-Copy DRM Malware☆57Updated 9 months ago
- ☆26Updated 2 years ago
- ☆27Updated 2 years ago
- Aplos an extremely simple fuzzer for Windows binaries.☆69Updated 3 months ago
- Detect userland hooks placed by AV/EDR☆27Updated last year
- A small red team course☆39Updated 2 years ago
- Windows x64 Exploitation Training☆15Updated last week
- ☆48Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆21Updated 2 years ago
- ☆37Updated 3 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year
- Situational Awareness script to identify how and where to run implants☆50Updated 6 months ago
- Offensive Assembly code snippets.☆12Updated last year