deletehead / pen_300_osep_prep
Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam
☆198Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for pen_300_osep_prep
- ☆383Updated 3 years ago
- Active Directory Labs/exams Review☆242Updated 3 years ago
- This repository contains previous material necessary to opt for the OSEP (Evasion Techniques and Breaching Defenses) certification☆142Updated 3 years ago
- Markdown reporting templates and Pandoc styling references to generate sleek reports for OSCP/PWK with little effort.☆200Updated 3 years ago
- Windows Kernel Exploits☆65Updated 7 years ago
- ☆213Updated 2 years ago
- Certified Red Team Operator☆195Updated 2 years ago
- ☆209Updated 4 years ago
- Stuff done in preparation for AWAE course and OSWE certification☆151Updated 4 years ago
- PEN-300 collection to help you on your exam.☆335Updated 8 months ago
- Notes compiled for the OSCP exam.☆139Updated 2 years ago
- ☆79Updated 4 years ago
- ☆154Updated 2 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆244Updated 9 months ago
- ☆127Updated 6 months ago
- My OSCP notes☆215Updated 4 months ago
- Becoming the spider, crawling through the webs to catch the fly.☆72Updated 3 years ago
- ☆104Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆216Updated 2 years ago
- Juicy Potato for x86 Windows☆117Updated 5 years ago
- ☆121Updated 3 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆137Updated 3 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆501Updated 4 months ago
- Active Directory Wordlists☆86Updated 4 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆75Updated 3 years ago
- Changes for Visual Studio 2013☆114Updated 9 years ago
- Powershell crazy and sometimes diabolic scripts☆147Updated 4 years ago
- ☆115Updated 4 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆207Updated last year
- ☆97Updated 2 years ago