ToBeatElite / InfoSecNotesLinks
☆12Updated 2 years ago
Alternatives and similar repositories for InfoSecNotes
Users that are interested in InfoSecNotes are comparing it to the libraries listed below
Sorting:
- vulnerable windows binaries for exploitation practice☆48Updated 3 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆50Updated 2 years ago
- Get SYSTEM via SeDebugPrivilege☆24Updated 3 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆24Updated 4 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆48Updated 5 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆100Updated last year
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆78Updated 2 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Updated 3 years ago
- Random☆34Updated 3 years ago
- ☆21Updated 4 years ago
- ☆40Updated 3 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Updated 5 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Updated 3 years ago
- ☆62Updated 2 years ago
- rcat☆73Updated 3 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆109Updated 3 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Updated 3 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 3 years ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Updated 4 years ago
- ☆73Updated 9 months ago
- ☆27Updated 3 years ago
- Windows internals and exploitation tricks☆108Updated last month
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated 5 months ago
- SeManageVolumePrivilege to SYSTEM☆140Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated 9 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 10 months ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Updated 4 years ago