PwnAwan / EXP-401-OSEE
A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.
☆95Updated 2 years ago
Alternatives and similar repositories for EXP-401-OSEE:
Users that are interested in EXP-401-OSEE are comparing it to the libraries listed below
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆47Updated last year
- QuoteDB (Vulnerable TCP Server)☆64Updated last year
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆44Updated 4 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆45Updated last year
- Signatus - Vulnerable TCP C++ server to practice Win 32 exploitation.☆47Updated 3 years ago
- A curated list of resources for the OSED journey.☆59Updated 3 years ago
- vulnerable windows binaries for exploitation practice☆39Updated 2 years ago
- Python based WinDbg script to automate the search for code caves in binaries and libraries.☆44Updated 2 months ago
- ☆105Updated 8 months ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆17Updated 3 years ago
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆54Updated 2 years ago
- ☆137Updated last year
- Windbg Readable & Dark Green Theme - Own Use☆44Updated 5 years ago
- ☆84Updated 2 years ago
- Local & remote Windows DLL Proxying☆161Updated 8 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆66Updated 4 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆135Updated 6 months ago
- SeManageVolumePrivilege to SYSTEM☆90Updated last year
- ☆29Updated 6 months ago
- ☆63Updated 11 months ago
- Open Source C&C Specification☆239Updated last week
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 3 weeks ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆99Updated last year
- ☆177Updated last year
- Encodes a payload within a generated mock-CSS file☆59Updated last year
- AV EVASION TECHNIQUES☆77Updated 2 years ago
- CVE-2024-30090 - LPE PoC☆105Updated 4 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆138Updated 2 months ago
- Basic reverse shell in C using socket() with complete explanation☆65Updated last year