emanuelepicas / OSEPLinks
OSEP - Offsec Expert Professional
☆19Updated last year
Alternatives and similar repositories for OSEP
Users that are interested in OSEP are comparing it to the libraries listed below
Sorting:
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago
- ☆19Updated 3 years ago
- ☆34Updated 3 years ago
- A webshell application and interactive shell for pentesting Apache Tomcat servers.☆126Updated last year
- List of some AD tools I frequently use☆56Updated 3 months ago
- Just some random small tools for dealing with asp.net Forms Authentication Cookies☆30Updated 4 years ago
- CVE-2022-22963 is a vulnerability in the Spring Cloud Function Framework for Java that allows remote code execution. This python script w…☆24Updated 2 years ago
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆56Updated 2 years ago
- ☆27Updated 4 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆106Updated 2 years ago
- CVE-2023-20198 Exploit PoC☆63Updated 2 years ago
- Active Directory share enumeration tool☆12Updated 9 months ago
- cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text ver…☆39Updated 3 years ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆26Updated last year
- ☆43Updated 2 years ago
- This cheatsheet contains Active Directory (AD) exploitation techniques, showcasing methods used to identify and abuse misconfigurations o…☆54Updated 2 years ago
- ☆95Updated 7 months ago
- The purpose of this repo is to share my research☆14Updated 10 months ago
- Windows Privilege Escalation☆22Updated 3 years ago
- ☆39Updated 4 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- ☆27Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆36Updated 2 years ago
- Crackmapexec custom scripts used in my internal pentests.☆25Updated 2 years ago
- Automated exploitation of MSSQL servers at scale☆127Updated last week
- ☆48Updated 3 months ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆87Updated 3 years ago
- Retrieve AD accounts description and search for password in it☆82Updated 3 years ago
- Apuntes Pentesting a ActiveDirectory PentesterAcademy☆22Updated 6 years ago