gscamelo / OSEE
All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.
☆45Updated 4 years ago
Alternatives and similar repositories for OSEE:
Users that are interested in OSEE are comparing it to the libraries listed below
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆45Updated last year
- vulnerable windows binaries for exploitation practice☆40Updated 2 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆97Updated 3 years ago
- A collection of PoCs for different injection techniques on Windows!☆44Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆80Updated this week
- A curated list of resources for the OSED journey.☆62Updated 3 years ago
- ☆38Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- IAT Unhooking proof-of-concept☆29Updated last year
- Red Team Operation's Defense Evasion Technique.☆53Updated 11 months ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆18Updated 3 years ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- Python based WinDbg script to automate the search for code caves in binaries and libraries.☆49Updated 4 months ago
- Situational Awareness script to identify how and where to run implants☆50Updated 5 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 10 months ago
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆58Updated last year
- Mockingjay process self injection POC☆32Updated last year
- ☆85Updated 2 years ago
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆21Updated 3 years ago
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆101Updated last year
- ☆36Updated last year
- Brief writeup of post exploitation methodologies.☆18Updated last year
- in-process powershell runner for BRC4☆45Updated last year
- Windows x64 Exploitation Training☆15Updated 3 weeks ago
- A small red team course☆37Updated last year
- OFFZONE 2024 Malware Persistence workshop☆19Updated 4 months ago
- QuoteDB (Vulnerable TCP Server)☆70Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year