Nero22k / Exploit_DevelopmentLinks
Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by offensive security.
☆26Updated 4 years ago
Alternatives and similar repositories for Exploit_Development
Users that are interested in Exploit_Development are comparing it to the libraries listed below
Sorting:
- offensive notes & resources☆43Updated 7 months ago
- ☆38Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- ☆21Updated 3 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆24Updated 4 years ago
- Presentaciones de congresos☆54Updated last year
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆23Updated 6 years ago
- Creates and sends fake meeting invite☆71Updated 4 years ago
- ☆47Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- Posts about different topics☆40Updated 3 months ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Updated 3 years ago
- Random Exploits☆50Updated 2 years ago
- ☆48Updated 2 years ago
- Red Team Operator: Malware Development Essentials Course☆100Updated 5 years ago
- Windows internals and exploitation tricks☆106Updated 2 weeks ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Updated 5 years ago
- ☆16Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- This repo will contain some basic pentest/RT commands.☆37Updated 3 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆47Updated 5 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- A collection of PoCs for different injection techniques on Windows!☆47Updated 2 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆38Updated 2 years ago