bmdyy / osed_prepLinks
A collection of Windows x32 exploits created while preparing for the OSED certification exam
☆22Updated 4 years ago
Alternatives and similar repositories for osed_prep
Users that are interested in osed_prep are comparing it to the libraries listed below
Sorting:
- ☆21Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆45Updated 3 years ago
- Presentaciones de congresos☆53Updated last year
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- Exploits written while preparing for the OSED exam☆22Updated last year
- Tradecraft Development Fundamentals☆40Updated 3 years ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆47Updated last year
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆14Updated 5 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- ☆34Updated 3 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆91Updated 3 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 5 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year
- ☆48Updated last year
- Random☆34Updated 2 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- ☆52Updated last year
- ☆71Updated 3 weeks ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆55Updated 4 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- ☆57Updated last year
- ☆42Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- ☆23Updated 3 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 2 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago