dhn / OSEE
Collection of resources for my preparation to take the OSEE certification.
☆227Updated 4 years ago
Alternatives and similar repositories for OSEE:
Users that are interested in OSEE are comparing it to the libraries listed below
- OSEE Preparation☆174Updated 6 years ago
- ☆295Updated 2 years ago
- ☆183Updated last year
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆140Updated 3 years ago
- ☆182Updated 7 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆520Updated 7 months ago
- ☆385Updated 4 years ago
- ☆141Updated 5 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆225Updated 4 years ago
- ☆86Updated 7 years ago
- esoteric☆51Updated 4 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆140Updated 3 years ago
- The best resources for learning exploit development☆111Updated 5 years ago
- Collection of things made during my preparation to take on OSEE☆95Updated 5 years ago
- A curated list of resources for the OSED journey.☆58Updated 3 years ago
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆207Updated 4 years ago
- Stash for Binary Exploitation and Reverse Engineering Resources☆101Updated 4 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆143Updated 5 years ago
- RE / Binary Exploitation Resources☆67Updated 7 years ago
- Malware development for red teaming workshop☆215Updated 3 years ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆610Updated 5 months ago
- Pwning notes☆45Updated 6 months ago
- 0xpat blog☆100Updated 3 years ago
- collect for learning cases☆575Updated 8 months ago
- Automatic exploit generation for simple linux pwn challenges.☆315Updated last year
- A curated list of awesome Windows Exploitation resources, and shiny things.☆72Updated 7 years ago
- Don't let buffer overflows overflow your mind☆433Updated 4 years ago
- Vulnerability examples.☆402Updated 9 months ago
- Active Directory Labs/exams Review☆251Updated 3 years ago
- Exercise writeups from the book Practical Malware Analysis.☆200Updated last year