ThiagoMathiaz / OSWE-Latex-Template
☆10Updated 2 years ago
Alternatives and similar repositories for OSWE-Latex-Template:
Users that are interested in OSWE-Latex-Template are comparing it to the libraries listed below
- ☆52Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆15Updated 10 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- ☆25Updated this week
- Extra cmdlets to help with quering security related information from Azure☆13Updated 4 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33Updated 7 months ago
- Brief writeup of post exploitation methodologies.☆17Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆36Updated 9 months ago
- ☆15Updated last year
- User enumeration and password spraying tool for testing Azure AD☆68Updated 2 years ago
- Windows Post-Exploitation tools wrapper☆11Updated 6 months ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆25Updated last year
- Dump Kerberos tickets from the KCM database of SSSD☆49Updated 4 months ago
- ☆27Updated last year
- ☆11Updated 6 months ago
- Discord C2 Profile for Mythic☆26Updated 9 months ago
- ☆39Updated this week
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆18Updated 2 months ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆13Updated 3 years ago
- ☆15Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆35Updated last month
- Random☆32Updated 2 years ago
- ☆25Updated last year
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆35Updated 8 months ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- Vulnerable Windows Application☆15Updated last year
- ☆12Updated 2 years ago
- ☆41Updated 2 years ago
- Azure pentesting reference for Altered Security Lab☆24Updated 2 years ago