A collection of code snippets built to assist with breaking chains.
☆126Apr 24, 2024Updated last year
Alternatives and similar repositories for OSEP-Breaking-Chains
Users that are interested in OSEP-Breaking-Chains are comparing it to the libraries listed below
Sorting:
- ☆295Mar 31, 2022Updated 3 years ago
- ☆21Dec 1, 2021Updated 4 years ago
- ☆39Oct 2, 2021Updated 4 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,413Jul 27, 2025Updated 7 months ago
- PEN-300 collection to help you on your exam.☆697Feb 25, 2026Updated last week
- Using PowerShell to quickly scan through the SYSVOL share for exposed credentials within auto logon policies.☆14Nov 30, 2022Updated 3 years ago
- A marriage between Octoberfest7/OSEP-Tools and chvancooten/OSEP-Code-Snippets with some improvements/additions☆99Jan 3, 2026Updated 2 months ago
- Journey so Far☆32Feb 15, 2022Updated 4 years ago
- Powershell tool to automate Active Directory enumeration.☆1,284Sep 9, 2025Updated 5 months ago
- Becoming the spider, crawling through the webs to catch the fly.☆83Jun 25, 2021Updated 4 years ago
- PEN-300/OSEP Public resources for PEN-300 Training☆127Sep 2, 2021Updated 4 years ago
- BadAssMacros - C# based automated Malicous Macro Generator.☆439Jan 8, 2022Updated 4 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆599Jul 15, 2024Updated last year
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆39Jan 4, 2023Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- ☆134Feb 5, 2021Updated 5 years ago
- TUDO — A Vulnerable PHP Web App☆128Dec 22, 2025Updated 2 months ago
- TESTR - A Vulnerable Python Web-App to practice XSS and Command Injection☆41Oct 8, 2022Updated 3 years ago
- Automating payload generation for OSEP labs and exam.☆34Jun 30, 2022Updated 3 years ago
- ☆430Nov 28, 2020Updated 5 years ago
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆800Aug 18, 2024Updated last year
- ☆1,670Apr 14, 2025Updated 10 months ago
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file con…☆27Mar 13, 2023Updated 2 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆146Sep 18, 2022Updated 3 years ago
- vulnerable windows binaries for exploitation practice☆48Jun 6, 2022Updated 3 years ago
- Bypass for PowerShell Constrained Language Mode☆406Dec 23, 2021Updated 4 years ago
- ☆55Sep 13, 2022Updated 3 years ago
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- A curated list of resources for the OSED journey.☆71Feb 3, 2022Updated 4 years ago
- Tool to bypass LSA Protection (aka Protected Process Light)☆989Dec 4, 2022Updated 3 years ago
- Zipper, a CobaltStrike file and folder compression utility.☆222Jan 18, 2020Updated 6 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆42Sep 3, 2020Updated 5 years ago
- Code dump from PEN-300/OSEP updated 2022☆43Aug 23, 2022Updated 3 years ago
- Red Team Cheatsheet in constant expansion.☆1,264Dec 28, 2023Updated 2 years ago
- You don't need wires to be connected☆42Apr 8, 2020Updated 5 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration feature…☆301Apr 25, 2023Updated 2 years ago