Offensive Software Exploitation Course
☆2,512May 31, 2023Updated 2 years ago
Alternatives and similar repositories for exploitation-course
Users that are interested in exploitation-course are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Materials for Windows Malware Analysis training (volume 1)☆2,031Jul 1, 2024Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,904Oct 29, 2025Updated 5 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,565Jan 18, 2026Updated 2 months ago
- Resources for Windows exploit development☆1,650Dec 20, 2021Updated 4 years ago
- OSWE, OSEP, OSED, OSEE☆3,798Jan 2, 2026Updated 3 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Everything related to Linux Forensics☆718Jul 13, 2023Updated 2 years ago
- A workshop about Malware Development☆1,776Jun 2, 2023Updated 2 years ago
- Tools & Interesting Things for RedTeam Ops☆2,265Feb 10, 2026Updated 2 months ago
- Tools and Techniques for Red Team / Penetration Testing☆8,641Mar 18, 2025Updated last year
- Rust Weaponization for Red Team Engagements.☆2,996Apr 25, 2024Updated last year
- ☆1,075May 18, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,183Mar 28, 2025Updated last year
- Red Teaming Tactics and Techniques☆4,549Aug 22, 2024Updated last year
- ☆778Oct 17, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- The Havoc Framework☆8,266Dec 18, 2025Updated 3 months ago
- A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit/64-bit ARM, 8-bit AVR and 32-bit RISC-V architectures.☆13,450Updated this week
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,879Aug 18, 2023Updated 2 years ago
- game of active directory☆7,691Mar 12, 2026Updated last month
- A collection of tools which integrate with Cobalt Strike (and possibly other C2 frameworks) through BOF and reflective DLL loading techni…☆1,375Oct 27, 2023Updated 2 years ago
- Collection of methodology and test case for various web vulnerabilities.☆7,078Jun 25, 2025Updated 9 months ago
- List of awesome reverse engineering resources☆10,033Jul 29, 2023Updated 2 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆923May 20, 2024Updated last year
- ☆2,178Apr 3, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆764Jan 26, 2025Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,161Mar 8, 2026Updated last month
- Automation for internal Windows Penetrationtest / AD-Security☆3,653Aug 28, 2025Updated 7 months ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,428Jul 27, 2025Updated 8 months ago
- All about bug bounty (bypasses, payloads, and etc)☆6,689Sep 8, 2023Updated 2 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,270Apr 12, 2024Updated 2 years ago
- Collection of malware source code for a variety of platforms in an array of different programming languages.☆17,953Sep 10, 2025Updated 7 months ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,504Dec 21, 2023Updated 2 years ago
- Win32 and Kernel abusing techniques for pentesters☆977Sep 3, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Mind-Maps of Several Things☆2,634Jun 29, 2023Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,237Sep 29, 2025Updated 6 months ago
- A Huge Learning Resources with Labs For Offensive Security Players☆1,124Dec 9, 2025Updated 4 months ago
- List of Awesome Red Teaming Resources☆7,878Dec 28, 2023Updated 2 years ago
- Malwoverview is a first response tool for threat hunting across VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, M…☆3,732Mar 21, 2026Updated 3 weeks ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆2,142Nov 28, 2024Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,625Jan 13, 2024Updated 2 years ago