A collection of study notes and resources for the Offensive Security Certified Professional (OSCP) certification exam. Includes summaries, key concepts, and practical tips.
☆66Nov 15, 2025Updated 4 months ago
Alternatives and similar repositories for OSCP-Notes
Users that are interested in OSCP-Notes are comparing it to the libraries listed below
Sorting:
- List of all Red Teaming tools and Techniques for each stages☆22Dec 28, 2022Updated 3 years ago
- Obsidian Notes used to passed the OSCP exam and most HTB machines / challenges.☆49May 20, 2025Updated 10 months ago
- ☆14Nov 16, 2024Updated last year
- Windows Privilege Escalation (Modified RottePotato)☆13Jun 5, 2018Updated 7 years ago
- ☆48Oct 15, 2025Updated 5 months ago
- Repository for tools used for the OSCP☆23Sep 18, 2025Updated 6 months ago
- Collection of notes and scripts I used during my OSCP exam preparation.☆42Dec 21, 2025Updated 3 months ago
- Study Notes for the OSCP Content You will find notes from various resources like OSCP from Nakerah Network, Practical Ethical Hacking(PEH…☆97Sep 12, 2023Updated 2 years ago
- OSCP Cheatsheet☆16Jun 14, 2023Updated 2 years ago
- These are the checklists I used during each phase of my CPTS Exam.☆46Jun 7, 2025Updated 9 months ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- useful stuff for pentesting☆49Mar 18, 2025Updated last year
- A lightweight Python HTTP server with fuzzy filename matching and automatic fallback to directory listing.☆13Aug 28, 2025Updated 6 months ago
- ☆30Sep 20, 2023Updated 2 years ago
- vulnerability that allows unauthorized control of an IP camera using the ONVIF protocol, The provided proof-of-concept code is capable c…☆12Apr 13, 2025Updated 11 months ago
- A cheatsheet I made while taking OSCP+/PEN-200 in 2024-2025☆36Apr 1, 2025Updated 11 months ago
- Piso wifi vendo trolling tool☆13Dec 14, 2023Updated 2 years ago
- Exploring Pegasus Spyware: A Deep Dive☆10Nov 25, 2023Updated 2 years ago
- Python Exploitation Framework☆38Mar 9, 2026Updated last week
- Windows 7 Professional 7601 Service Pack 1 is vulnerable to eternalblue exploit and while exploiting this myself i ran into a number of i…☆11Jun 27, 2021Updated 4 years ago
- A PoC of CVE-2025-24071 / CVE-2025-24054, A windows vulnerability that allow get NTMLv2 hashes☆25May 15, 2025Updated 10 months ago
- PoC for CVE-2022-23940☆12May 7, 2025Updated 10 months ago
- CVE-2024-23897 | Jenkins <= 2.441 & <= LTS 2.426.2 PoC and scanner.☆80Feb 29, 2024Updated 2 years ago
- This is a compiled cheatsheet from my experience of OSCP 2023 journey. Won't say it is all-rounded but a good starting point if you wanna…☆14Oct 17, 2024Updated last year
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆14Jan 4, 2026Updated 2 months ago
- All knowledge I gained from CTFs, real life penetration testing and learning by myself.☆161Feb 14, 2026Updated last month
- ☆10Apr 14, 2025Updated 11 months ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆13Aug 22, 2025Updated 7 months ago
- Windows Product Key☆11Mar 27, 2023Updated 2 years ago
- My OSCP Prep Sandbox!!☆184Jun 2, 2025Updated 9 months ago
- ☆21May 25, 2025Updated 9 months ago
- Bruteforce Keepass databases (KDBX 4.x format)☆140Jul 16, 2024Updated last year
- inux based ransomware tool that can create a ransomware code for linux machine.☆14Apr 11, 2025Updated 11 months ago
- dedsec admin is a piso wifi admin username and password stealer tool☆10Dec 10, 2023Updated 2 years ago
- linux based virus builder tool that can create a fully offline windows virus executable.☆12Apr 17, 2025Updated 11 months ago
- Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote cod…☆12Jul 2, 2024Updated last year
- Material from CTF machines I have attempted☆39Jul 5, 2021Updated 4 years ago
- linux based super-stealthy Dropper, that can create a fully undetected linux malware executable.☆11Apr 13, 2025Updated 11 months ago
- Hours of research on color theory and what hues stimulate the eyes, and hand-picked hacked icons☆14Mar 13, 2024Updated 2 years ago