Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding
☆142Oct 3, 2021Updated 4 years ago
Alternatives and similar repositories for Exploit-Dev-OSCE
Users that are interested in Exploit-Dev-OSCE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆236Aug 21, 2020Updated 5 years ago
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- ☆317Apr 8, 2022Updated 4 years ago
- Tools that I've created/used during CTP-OSCE☆10Jun 17, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65May 31, 2020Updated 5 years ago
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆241Feb 13, 2021Updated 5 years ago
- ☆25Mar 21, 2020Updated 6 years ago
- My walkthrough of the LPEWorkshop exercises☆36Aug 17, 2020Updated 5 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Sep 9, 2020Updated 5 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆145Aug 4, 2021Updated 4 years ago
- Empower your enumeration during OSCP☆36Dec 7, 2018Updated 7 years ago
- ./kumasia php simple backdoor☆22Jul 6, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- ☆144Jan 8, 2020Updated 6 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Oct 4, 2019Updated 6 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆605Jul 15, 2024Updated last year
- Penetration testing utility and antivirus assessment tool.☆314Apr 25, 2023Updated 2 years ago
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Feb 24, 2022Updated 4 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆82Jul 7, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- PowerShell payload generator☆120Sep 30, 2021Updated 4 years ago
- A Burp extension to show the Collaborator client in a tab☆24Dec 23, 2022Updated 3 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆113Dec 23, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Writeups and solver scripts wrote for CTFS and Wargames, mostly memory corruption and reverse engineering tasks.☆12Feb 2, 2023Updated 3 years ago
- ☆12Mar 4, 2023Updated 3 years ago
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- ssshh its a secret ;)☆21Mar 7, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆119Jun 17, 2021Updated 4 years ago
- The Fuzzil is a program which injects automatically data into a webpage and detect potential bugs.☆21Mar 5, 2020Updated 6 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Mar 29, 2026Updated last week
- lateral movement techniques that can be used during red team exercises☆277Jan 13, 2020Updated 6 years ago
- ☆26Sep 2, 2016Updated 9 years ago
- ☆36Jul 11, 2018Updated 7 years ago
- Information Gathering and OSINT Tool☆13Mar 15, 2024Updated 2 years ago