Sh3lldon / RemoteAppLinks
I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel free to DM me in discord, if you have any questions about solving this tasks :) (P.S The fourth expliot will be later on)
☆52Updated 2 years ago
Alternatives and similar repositories for RemoteApp
Users that are interested in RemoteApp are comparing it to the libraries listed below
Sorting:
- vulnerable windows binaries for exploitation practice☆49Updated 3 years ago
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆80Updated 2 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆48Updated 5 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- ☆28Updated 3 years ago
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆84Updated 2 years ago
- ☆75Updated 10 months ago
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆72Updated 3 years ago
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆120Updated 3 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 3 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆113Updated 3 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆111Updated 2 years ago
- Signatus - A Vulnerable TCP server to practice Win32 exploitation☆52Updated 4 years ago
- Rusty Impersonate☆106Updated 3 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated 2 years ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆154Updated 3 months ago
- Utilities for obfuscating shellcode☆98Updated 4 months ago
- Simple BOF to read the protection level of a process☆119Updated 2 years ago
- ☆12Updated 2 years ago
- D/Invoke standalone shellcode runners☆39Updated 2 years ago
- Your syscall factory☆126Updated 3 weeks ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆24Updated 4 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆99Updated last year
- A small red team course☆40Updated 2 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆27Updated last year
- Find .net assemblies locally☆130Updated 3 years ago
- A Python POC for CRED1 over SOCKS5☆164Updated last year
- ☆120Updated 10 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆45Updated last year
- Find DLLs with RWX section☆80Updated 2 years ago