ashemery / exploitation-course
Offensive Software Exploitation Course
☆2,354Updated last year
Alternatives and similar repositories for exploitation-course:
Users that are interested in exploitation-course are comparing it to the libraries listed below
- Tools & Interesting Things for RedTeam Ops☆2,165Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,116Updated 4 months ago
- OSWE, OSEP, OSED, OSEE☆2,698Updated 7 months ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,258Updated last month
- A curated list of awesome OSCP resources☆2,779Updated 8 months ago
- Tools and Techniques for Red Team / Penetration Testing☆6,217Updated last year
- Red Teaming & Pentesting checklists for various engagements☆2,522Updated 4 months ago
- Tools and Techniques for Blue Team / Incident Response☆2,901Updated 9 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,752Updated 7 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆5,815Updated 3 months ago
- You didn't think I'd go and leave the blue team out, right?☆1,631Updated last year
- List of Awesome Red Teaming Resources☆7,026Updated last year
- Mind-Maps of Several Things☆2,494Updated last year
- A workshop about Malware Development☆1,608Updated last year
- Materials for Windows Malware Analysis training (volume 1)☆1,957Updated 6 months ago
- Organized list of my malware development resources☆1,469Updated 2 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,340Updated last year
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,280Updated 2 months ago
- ☆1,517Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,513Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,584Updated last month
- ☆2,182Updated last year
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,307Updated 3 weeks ago
- Projects for security students☆2,314Updated 4 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,861Updated last year
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,042Updated 9 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,626Updated last year
- A collection of awesome one-liner scripts especially for bug bounty tips.☆2,754Updated 5 months ago
- Windows / Linux Local Privilege Escalation Workshop☆1,909Updated 2 years ago
- Resources for Windows exploit development☆1,552Updated 3 years ago