A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.
☆10Aug 2, 2021Updated 4 years ago
Alternatives and similar repositories for OSEP-Code-Snippets
Users that are interested in OSEP-Code-Snippets are comparing it to the libraries listed below
Sorting:
- using VBS to download and install a powershell malware☆39Jun 28, 2019Updated 6 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆32Oct 30, 2021Updated 4 years ago
- Injecting shellcode into a process memory and executing it in C#☆52Oct 2, 2022Updated 3 years ago
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- a basic IDE compiler for C# and VB.NET using codedom☆44Sep 22, 2019Updated 6 years ago
- Hidden Features Full Hidden Access Hidden Desktop Hidden Browsers Hidden Cmd Clone Profile Hidden PowerShell Hidden Explorer Hidde…☆19Sep 30, 2022Updated 3 years ago
- Download payload to disk and install it to startup then melt.☆35Apr 9, 2019Updated 6 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆65Aug 17, 2019Updated 6 years ago
- A collection of awesome readme templates to display on your profile☆20Jul 25, 2020Updated 5 years ago
- A simple "ransomware" using powershell☆14May 31, 2021Updated 4 years ago
- Simple way to read wirte delete values from registry☆18Jun 24, 2019Updated 6 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆18Nov 8, 2017Updated 8 years ago
- A bots loader for CVE-2022-29464 with multithreading☆11Dec 29, 2025Updated 2 months ago
- Attempt at recreating a windows-based DKOM rootkit using c#☆12Sep 11, 2016Updated 9 years ago
- Simple example of how to remove all malwares from disk and registry.☆43Jun 13, 2019Updated 6 years ago
- Hide malware behind a legit process C#☆128Mar 1, 2020Updated 6 years ago
- Download a payload and make it run from registry without droppng.☆110Apr 9, 2019Updated 6 years ago
- C# Codedom example / builder☆24Mar 8, 2020Updated 5 years ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- ☆26Sep 17, 2017Updated 8 years ago
- JS Jscript - download file from url then run it☆60Mar 11, 2020Updated 5 years ago
- A Silent Miner that mines Crypto - XMR and ETH☆16Feb 5, 2023Updated 3 years ago
- A Python script that runs a machine learning analysis on data from RaiGames.io to predict the next crash.☆11Jun 21, 2022Updated 3 years ago
- Escalation / Bypass Windows UAC☆117Sep 16, 2019Updated 6 years ago
- ☆29Jul 14, 2022Updated 3 years ago
- Detect virtual environment☆67Apr 25, 2019Updated 6 years ago
- 💻 Windows 10 Kernel-mode rootkit☆32Sep 3, 2022Updated 3 years ago
- This is a Bad USB script which will download and execute any file from the web which is accessible from a direct download link and it wil…☆34Mar 20, 2021Updated 4 years ago
- ☆10Jun 1, 2022Updated 3 years ago
- A way to get fake followers on Clubhouse☆10Jan 6, 2022Updated 4 years ago
- Keep track of a GSM device and show its location on a map☆11Apr 14, 2016Updated 9 years ago
- ☆10Jun 16, 2018Updated 7 years ago
- ☆10Aug 9, 2024Updated last year
- Disable WD using VBS☆120Oct 3, 2022Updated 3 years ago
- Learning Process Injection and Hollowing techniques☆42Jun 26, 2022Updated 3 years ago
- ☆42Apr 22, 2021Updated 4 years ago