blackc03r / OSCP-CheatsheetsLinks
OSCP Cheatsheets
☆99Updated 6 years ago
Alternatives and similar repositories for OSCP-Cheatsheets
Users that are interested in OSCP-Cheatsheets are comparing it to the libraries listed below
Sorting:
- PEN-300/OSEP Public resources for PEN-300 Training☆123Updated 4 years ago
- ☆161Updated 4 months ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆146Updated 3 years ago
- Inject remote template link into word document for remote template injection☆185Updated 4 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- ☆119Updated 4 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated last year
- ☆200Updated 6 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆125Updated 5 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆240Updated 2 years ago
- Identifies the bytes that Microsoft Defender flags on.☆101Updated 3 years ago
- My thoughts from going through the OSEP materials.☆20Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆48Updated 2 years ago
- Low and slow password spraying tool, designed to spray on an interval over a long period of time☆218Updated this week
- A script to test credentials against Active Directory Federation Services (ADFS), allowing password spraying or bruteforce attacks.☆181Updated 4 years ago
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆231Updated 4 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆69Updated last year
- Simple AV Evasion for PE Files☆42Updated 4 years ago
- scan for NTLM directories☆377Updated 5 months ago
- Dumping LAPS from Python☆282Updated 3 years ago
- ☆85Updated 5 years ago
- BloodHound Docker Ready to Use☆91Updated 2 years ago
- Windows Kernel Exploits☆69Updated 8 years ago
- Fully functioning reverse shell written entirely in VBA.☆126Updated 2 years ago
- Password attacks and MFA validation against various endpoints in Azure and Office 365☆153Updated 2 years ago
- ☆252Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆238Updated 4 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆107Updated 2 years ago
- ☆101Updated last year
- ☆33Updated 5 years ago