buyne / OSEP-1
☆31Updated 3 years ago
Alternatives and similar repositories for OSEP-1:
Users that are interested in OSEP-1 are comparing it to the libraries listed below
- Payload Generation Framework☆91Updated last year
- Code dump from PEN-300/OSEP updated 2022☆40Updated 2 years ago
- AV EVASION TECHNIQUES☆79Updated 2 years ago
- Shellcode generation and encoding utility☆21Updated 2 years ago
- A variety of AV evasion techniques written in C# for practice.☆88Updated 4 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆133Updated last year
- ☆55Updated 2 months ago
- Tools/scripts I used/developed during the EXP-301 course.☆18Updated 2 years ago
- A Python POC for CRED1 over SOCKS5☆147Updated 6 months ago
- ☆67Updated last month
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆56Updated 2 years ago
- PowerShell Reverse Shell☆61Updated last year
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- ☆29Updated 7 months ago
- D/Invoke standalone shellcode runners☆37Updated last year
- ☆117Updated 3 weeks ago
- Lateral Movement☆122Updated last year
- ☆159Updated 5 months ago
- A tool to enumerate and exploit SQL Servers in AD☆34Updated last year
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- ☆200Updated last year
- ☆48Updated 2 years ago
- A python port of @dafthack's MFAsweep with some added OPSEC functionality. MFAde can be used to find single-factor authentication failure…☆38Updated 2 months ago
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆25Updated 3 months ago
- ☆83Updated 3 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆112Updated 3 weeks ago
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated last year
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆119Updated 4 years ago
- SeRestorePrivilege to SYSTEM☆106Updated 3 years ago