ihack4falafel / OSEELinks
Collection of things made during my preparation to take on OSEE
☆101Updated 6 years ago
Alternatives and similar repositories for OSEE
Users that are interested in OSEE are comparing it to the libraries listed below
Sorting:
- Scripts I used during CTP☆68Updated 5 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- ☆36Updated 7 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- OSEE Preparation☆192Updated 6 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆25Updated 8 years ago
- A bunch of my exploit development helper tools, collected in one place.☆144Updated 3 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Linux Rootkits (4.x Kernel)☆86Updated 4 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆29Updated 7 years ago
- Fork of mona.py with x64dbg support☆109Updated 3 years ago
- A repository of previous info-sec presentations I've presented.☆163Updated last year
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆78Updated 5 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- ☆23Updated 8 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆152Updated 6 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 5 years ago
- Used for the osce exam preparation☆74Updated 9 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 5 years ago
- material for exploit development☆18Updated 6 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆75Updated 3 weeks ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30Updated 5 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Vulnerabilities, exploits, and PoCs☆37Updated 2 months ago
- My writeups of various CTFs & security challenges☆73Updated 3 months ago
- DEFCON 27 slides and workshop materials.☆128Updated 5 years ago
- Windows Enumeration and Privilege Escalation Script☆18Updated 6 years ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Updated 6 years ago
- ☆145Updated 6 years ago