epi052 / osed-scripts
bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)
☆541Updated 9 months ago
Alternatives and similar repositories for osed-scripts:
Users that are interested in osed-scripts are comparing it to the libraries listed below
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆647Updated 8 months ago
- ☆183Updated last year
- ☆395Updated 4 years ago
- Active Directory Labs/exams Review☆253Updated 4 years ago
- Collection of resources for my preparation to take the OSEE certification.☆274Updated 4 years ago
- Malware development for red teaming workshop☆219Updated 3 years ago
- ☆248Updated 3 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆1,186Updated 10 months ago
- This repository contains previous material necessary to opt for the OSEP (Evasion Techniques and Breaching Defenses) certification☆157Updated 4 years ago
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆213Updated 4 years ago
- Collection of Windows Privilege Escalation (Analyse/PoC/Exploit)☆383Updated 5 months ago
- PEN-300 collection to help you on your exam.☆538Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆700Updated 2 months ago
- Windows Local Privilege Escalation from Service Account to System☆788Updated 5 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,255Updated last year
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆612Updated 4 years ago
- Tips on how to write exploit scripts (faster!)☆480Updated 9 months ago
- Kerberoast with ACL abuse capabilities☆439Updated 4 months ago
- a tool to help operate in EDRs' blind spots☆728Updated 4 months ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆543Updated last year
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆656Updated last year
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,117Updated 11 months ago
- A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) wit…☆519Updated 2 months ago
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆202Updated 2 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆144Updated 2 years ago
- ☆750Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆912Updated 10 months ago
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆138Updated 10 months ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆289Updated 3 years ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆848Updated 3 months ago