Offensive Software Exploitation Course
☆2,514May 31, 2023Updated 2 years ago
Alternatives and similar repositories for exploitation-course
Users that are interested in exploitation-course are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Materials for Windows Malware Analysis training (volume 1)☆2,036Jul 1, 2024Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,910Oct 29, 2025Updated 6 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,603Jan 18, 2026Updated 3 months ago
- Resources for Windows exploit development☆1,653Dec 20, 2021Updated 4 years ago
- OSWE, OSEP, OSED, OSEE☆3,813Jan 2, 2026Updated 4 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Everything related to Linux Forensics☆719Jul 13, 2023Updated 2 years ago
- A workshop about Malware Development☆1,779Jun 2, 2023Updated 2 years ago
- Tools & Interesting Things for RedTeam Ops☆2,270Feb 10, 2026Updated 2 months ago
- Tools and Techniques for Red Team / Penetration Testing☆8,706Apr 18, 2026Updated 2 weeks ago
- Rust Weaponization for Red Team Engagements.☆3,006Apr 25, 2024Updated 2 years ago
- ☆1,075May 18, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,253Mar 28, 2025Updated last year
- ☆780Oct 17, 2023Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,582Aug 22, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The Havoc Framework☆8,328Dec 18, 2025Updated 4 months ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,524Apr 29, 2026Updated last week
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,881Aug 18, 2023Updated 2 years ago
- game of active directory☆7,771Mar 12, 2026Updated last month
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,384Oct 27, 2023Updated 2 years ago
- Collection of methodology and test case for various web vulnerabilities.☆7,106Jun 25, 2025Updated 10 months ago
- List of awesome reverse engineering resources☆10,067Jul 29, 2023Updated 2 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆923May 20, 2024Updated last year
- ☆2,187Apr 3, 2026Updated last month
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆765Jan 26, 2025Updated last year
- Automation for internal Windows Penetrationtest / AD-Security☆3,662Aug 28, 2025Updated 8 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,175Updated this week
- All about bug bounty (bypasses, payloads, and etc)☆6,716Sep 8, 2023Updated 2 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,434Jul 27, 2025Updated 9 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,282Apr 12, 2024Updated 2 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,503Dec 21, 2023Updated 2 years ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆18,017Sep 10, 2025Updated 7 months ago
- Win32 and Kernel abusing techniques for pentesters☆978Sep 3, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Mind-Maps of Several Things☆2,650Jun 29, 2023Updated 2 years ago
- A Huge Learning Resources with Labs For Offensive Security Players☆1,141Dec 9, 2025Updated 4 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,290Sep 29, 2025Updated 7 months ago
- List of Awesome Red Teaming Resources☆7,898Dec 28, 2023Updated 2 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,768Apr 16, 2026Updated 2 weeks ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆2,155Nov 28, 2024Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,632Jan 13, 2024Updated 2 years ago