ashemery / exploitation-courseLinks
Offensive Software Exploitation Course
☆2,393Updated 2 years ago
Alternatives and similar repositories for exploitation-course
Users that are interested in exploitation-course are comparing it to the libraries listed below
Sorting:
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,892Updated 3 months ago
- OSWE, OSEP, OSED, OSEE☆3,615Updated 3 weeks ago
- Tools & Interesting Things for RedTeam Ops☆2,244Updated 7 months ago
- A workshop about Malware Development☆1,755Updated 2 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,940Updated 2 years ago
- A Huge Learning Resources with Labs For Offensive Security Players☆1,087Updated last month
- Mind-Maps of Several Things☆2,620Updated 2 years ago
- You didn't think I'd go and leave the blue team out, right?☆1,728Updated 3 weeks ago
- ☆1,588Updated 2 years ago
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,494Updated 2 months ago
- Materials for Windows Malware Analysis training (volume 1)☆2,021Updated last year
- Projects for security students☆2,788Updated 3 months ago
- Leaked pentesting manuals given to Conti ransomware crooks☆1,075Updated 4 years ago
- A curated list of awesome OSCP resources☆3,331Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,456Updated last week
- Organized list of my malware development resources☆1,694Updated 3 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,441Updated last year
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,525Updated 2 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Hack The Box Labs on the basis of Operating System and Difficu…☆1,712Updated 2 years ago
- This is a repository of resource about Malware techniques☆822Updated 2 years ago
- All about bug bounty (bypasses, payloads, and etc)☆6,587Updated 2 years ago
- Resources for Windows exploit development☆1,648Updated 4 years ago
- A collection of snippets of codes and commands to make your life easier!☆2,850Updated 2 years ago
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,843Updated last month
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,870Updated 2 months ago
- A list of helpful cybersecurity / infosec resources☆1,350Updated last year
- Red Teaming & Pentesting checklists for various engagements☆2,630Updated 6 months ago
- BUG BOUNTY WRITEUPS - OWASP TOP 10 🔴🔴🔴🔴✔☆850Updated 3 years ago
- Hack-the-Box-OSCP-Preparation☆872Updated 5 years ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆1,238Updated 2 weeks ago