jayesther / OSEP_OSED_TOOLS
Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course
☆16Updated last year
Alternatives and similar repositories for OSEP_OSED_TOOLS:
Users that are interested in OSEP_OSED_TOOLS are comparing it to the libraries listed below
- ☆31Updated 3 years ago
- ☆28Updated 3 years ago
- ☆15Updated 3 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 5 months ago
- ☆48Updated 2 years ago
- ☆12Updated 9 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 4 months ago
- Scripts that automate portions of pentests.☆45Updated this week
- Used to get NTLMv2 Hashes from SMB☆12Updated 5 months ago
- Simple netexec wraper with html repport☆18Updated 10 months ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆22Updated 4 months ago
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆45Updated last year
- A Python based tool to convert custom queries from Legacy BloodHound to BloodHound CE format, with the option to directly upload them to …☆25Updated 3 months ago
- A small red team course☆37Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆113Updated 2 weeks ago
- Windows Post-Exploitation tools wrapper☆12Updated 9 months ago
- ☆83Updated 3 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- Tools/scripts I used/developed during the EXP-301 course.☆18Updated 2 years ago
- ☆54Updated 2 months ago
- A Python based ingestor for BloodHound☆83Updated 2 years ago
- ☆34Updated 4 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆37Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 10 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- ☆65Updated last month
- Situational Awareness script to identify how and where to run implants☆49Updated 4 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 7 months ago
- A Python POC for CRED1 over SOCKS5☆146Updated 6 months ago
- PowerShell Reverse Shell☆61Updated last year