blackc03r / OSCP-Cheatsheets
OSCP Cheatsheets
☆96Updated 5 years ago
Alternatives and similar repositories for OSCP-Cheatsheets:
Users that are interested in OSCP-Cheatsheets are comparing it to the libraries listed below
- Identifies the bytes that Microsoft Defender flags on.☆84Updated 2 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆97Updated 3 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated 10 months ago
- ☆117Updated 3 years ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- Inject remote template link into word document for remote template injection☆174Updated 4 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆120Updated 4 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆144Updated 2 years ago
- ☆13Updated 3 weeks ago
- ☆194Updated 5 years ago
- ☆79Updated 5 years ago
- Powershell script to extract information from boot PXE☆139Updated 6 years ago
- Payload Generation Framework☆91Updated last year
- AV EVASION TECHNIQUES☆79Updated 2 years ago
- This repo will contain some basic pentest/RT commands.☆37Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆40Updated last year
- Simple script to extract useful informations from the combo BloodHound + Neo4j☆241Updated last month
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆143Updated last year
- ☆220Updated 2 years ago
- PowerShell Constrained Language Mode Bypass☆262Updated 4 years ago
- CyberSec Blog☆95Updated last year
- Custom Queries - Brought Up to BH4.1 syntax☆251Updated last week
- Windows for Red Teamers☆126Updated 3 years ago
- ☆98Updated 3 years ago
- My thoughts from going through the OSEP materials.☆21Updated 4 years ago
- ☆32Updated 3 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- ☆87Updated 4 years ago
- A variety of AV evasion techniques written in C# for practice.☆89Updated 4 years ago
- Windows Kernel Exploits☆66Updated 7 years ago