ashemery / exploitation-courseLinks
Offensive Software Exploitation Course
☆2,373Updated 2 years ago
Alternatives and similar repositories for exploitation-course
Users that are interested in exploitation-course are comparing it to the libraries listed below
Sorting:
- Tools & Interesting Things for RedTeam Ops☆2,207Updated 3 weeks ago
- A workshop about Malware Development☆1,682Updated 2 years ago
- Materials for Windows Malware Analysis training (volume 1)☆1,995Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,799Updated last year
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,910Updated last year
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficu…☆1,644Updated 2 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,452Updated 2 years ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,044Updated 3 years ago
- OSWE, OSEP, OSED, OSEE☆3,328Updated 3 months ago
- Mind-Maps of Several Things☆2,565Updated 2 years ago
- Organized list of my malware development resources☆1,584Updated 3 years ago
- A curated list of awesome OSCP resources☆3,084Updated last year
- ☆1,567Updated 2 years ago
- Red Teaming & Pentesting checklists for various engagements☆2,570Updated 10 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,739Updated 2 years ago
- A list of helpful cybersecurity / infosec resources☆1,316Updated 7 months ago
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,427Updated 2 months ago
- Red Teaming Tactics and Techniques☆4,313Updated 10 months ago
- A Huge Learning Resources with Labs For Offensive Security Players☆973Updated 3 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,369Updated 8 months ago
- You didn't think I'd go and leave the blue team out, right?☆1,675Updated last month
- Projects for security students☆2,579Updated 10 months ago
- Resources for Windows exploit development☆1,600Updated 3 years ago
- Hack-the-Box-OSCP-Preparation☆827Updated 4 years ago
- A collection of snippets of codes and commands to make your life easier!☆2,754Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,076Updated 2 weeks ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,859Updated 3 months ago
- ☆545Updated 3 years ago
- Bug Bounty Roadmaps☆1,685Updated 4 years ago
- BUG BOUNTY WRITEUPS - OWASP TOP 10 🔴🔴🔴🔴✔☆842Updated 3 years ago