In3x0rabl3 / OSCPLinks
OSCP - Study
☆13Updated 4 years ago
Alternatives and similar repositories for OSCP
Users that are interested in OSCP are comparing it to the libraries listed below
Sorting:
- A collection of tools that I use in CTF's or for assessments☆107Updated last year
- ☆90Updated 2 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆46Updated 6 months ago
- This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe☆38Updated last year
- My Favorite Offensive Security Scripts☆83Updated 9 months ago
- Modules for my C2 course students to use for their own projects.☆74Updated 2 years ago
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆120Updated 3 months ago
- a map for the azure oriented pentests☆70Updated 2 years ago
- Vast.ai Password Kracking☆92Updated 3 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Updated 2 months ago
- Just some random Red Team Scripts that can be useful☆154Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- Everything and anything related to password spraying☆151Updated last year
- ☆106Updated 11 months ago
- A Bloodhound alternative. BloodBash will ingest the same files bloodhound does but no server is required to use this tool. It's great for…☆43Updated this week
- C2 Automation using Linode☆85Updated 3 years ago
- ☆76Updated last year
- linikatz is a tool to attack AD on UNIX☆155Updated 2 years ago
- Labs & Code snippets for RRT on TTI☆40Updated 3 years ago
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆67Updated 3 weeks ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated last year
- ☆105Updated 4 months ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆121Updated last year
- ☆37Updated 4 years ago
- ☆39Updated 4 years ago
- ☆104Updated 2 months ago
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆103Updated 5 months ago
- ☆22Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆107Updated 2 years ago