jayesther / OSEP_OSED_TOOLSLinks
Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course
☆16Updated last year
Alternatives and similar repositories for OSEP_OSED_TOOLS
Users that are interested in OSEP_OSED_TOOLS are comparing it to the libraries listed below
Sorting:
- ☆33Updated 3 years ago
- ☆17Updated 6 months ago
- Custom queries list for BloodHound☆28Updated 9 months ago
- A small red team course☆40Updated 2 years ago
- Simple netexec wraper with html repport☆19Updated last year
- ☆70Updated 3 weeks ago
- A repository of tools developed while studying for OSEP. The contents here are not part of courseware but some tools, i wrote as an exten…☆2Updated last year
- List of some AD tools I frequently use☆47Updated 2 weeks ago
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated last year
- ☆52Updated 2 years ago
- Scripts that automate portions of pentests.☆51Updated last month
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 6 months ago
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆38Updated last year
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆32Updated last week
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 10 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 7 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆44Updated last year
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆46Updated last year
- Launches a limited shell using PowerShell Runspaces with an optional AMSI Bypass. Does not invoke Powershell.exe☆13Updated last year
- ☆34Updated 3 years ago
- ☆88Updated 5 months ago
- Windows Post-Exploitation tools wrapper☆12Updated 11 months ago
- Brief writeup of post exploitation methodologies.☆18Updated last year
- A collection of Windows x32 exploits created while preparing for the OSED certification exam☆21Updated 3 years ago
- Used to get NTLMv2 Hashes from SMB☆14Updated 7 months ago
- ☆35Updated 6 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆115Updated 2 months ago