jayesther / OSEP_OSED_TOOLSLinks
Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course
☆20Updated last year
Alternatives and similar repositories for OSEP_OSED_TOOLS
Users that are interested in OSEP_OSED_TOOLS are comparing it to the libraries listed below
Sorting:
- Simple netexec wraper with html repport☆19Updated last year
- ☆36Updated 3 years ago
- ☆89Updated 6 months ago
- linikatz is a tool to attack AD on UNIX☆149Updated last year
- ☆86Updated 5 months ago
- LDAP Enumeration Tool for Pentesters☆48Updated 3 months ago
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 6 months ago
- ☆70Updated 4 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆106Updated 3 weeks ago
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆39Updated last month
- A small red team course☆40Updated 2 years ago
- Custom queries list for BloodHound☆29Updated 3 weeks ago
- Scripts that automate portions of pentests.☆52Updated 3 months ago
- ☆112Updated 2 months ago
- ☆12Updated last year
- ☆73Updated this week
- Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.☆41Updated last year
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated this week
- ☆34Updated 3 years ago
- Introductory guide on the configuration and subsequent exploitation of Active Directory Certificate Services with Certipy. Based on the w…☆133Updated last year
- ☆35Updated 8 months ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph☆107Updated this week
- ☆75Updated 3 months ago
- C++ Encrypted SSL/TLS REVERSE SHELL, designed to provide secure, encrypted communication between a compromised client and an attacker, wh…☆48Updated 6 months ago
- PowerShell Reverse Shell☆78Updated 2 years ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆123Updated 4 months ago
- A community-driven collection of BloodHound queries☆104Updated last month
- A Moodle Scanner☆42Updated 8 months ago
- ☆67Updated 6 months ago