Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding
☆143Oct 3, 2021Updated 4 years ago
Alternatives and similar repositories for Exploit-Dev-OSCE
Users that are interested in Exploit-Dev-OSCE are comparing it to the libraries listed below
Sorting:
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆234Aug 21, 2020Updated 5 years ago
- ☆318Apr 8, 2022Updated 3 years ago
- My walkthrough of the LPEWorkshop exercises☆36Aug 17, 2020Updated 5 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65May 31, 2020Updated 5 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆234Feb 13, 2021Updated 5 years ago
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- ☆25Mar 21, 2020Updated 5 years ago
- Empower your enumeration during OSCP☆36Dec 7, 2018Updated 7 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- ☆145Jan 8, 2020Updated 6 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆599Jul 15, 2024Updated last year
- PowerShell payload generator☆120Sep 30, 2021Updated 4 years ago
- Vagrant file and scripting for easy, disposable Kali Linux virtualization☆23Nov 8, 2019Updated 6 years ago
- ./kumasia php simple backdoor☆23Jul 6, 2025Updated 7 months ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆113Dec 23, 2020Updated 5 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Aug 4, 2021Updated 4 years ago
- Penetration testing utility and antivirus assessment tool.☆315Apr 25, 2023Updated 2 years ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Oct 4, 2019Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- Tools that I've created/used during CTP-OSCE☆10Jun 17, 2019Updated 6 years ago
- lateral movement techniques that can be used during red team exercises☆273Jan 13, 2020Updated 6 years ago
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- A Linux enumeration script for Hack The Box☆191Nov 27, 2019Updated 6 years ago
- Userland API monitor for threat hunting☆58Mar 4, 2020Updated 5 years ago
- ☆119Jun 17, 2021Updated 4 years ago
- ☆431Nov 28, 2020Updated 5 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆44Sep 18, 2019Updated 6 years ago
- The Fuzzil is a program which injects automatically data into a webpage and detect potential bugs.☆21Mar 5, 2020Updated 5 years ago
- ☆27Apr 9, 2022Updated 3 years ago
- ☆97Feb 18, 2025Updated last year