nop-tech / OSED
Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)
☆627Updated 6 months ago
Alternatives and similar repositories for OSED:
Users that are interested in OSED are comparing it to the libraries listed below
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆526Updated 7 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆651Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆684Updated last month
- PEN-300 collection to help you on your exam.☆370Updated last year
- Windows Local Privilege Escalation Cookbook☆1,069Updated last month
- ☆183Updated last year
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,230Updated last year
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆1,148Updated 9 months ago
- Tips on how to write exploit scripts (faster!)☆463Updated 7 months ago
- Awesome EDR Bypass Resources For Ethical Hacking☆1,108Updated last month
- Collection of resources for my preparation to take the OSEE certification.☆269Updated 4 years ago
- ☆387Updated 4 years ago
- Windows Local Privilege Escalation from Service Account to System☆762Updated 5 years ago
- ☆745Updated last year
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆367Updated 3 months ago
- ☆1,034Updated 9 months ago
- Malware development for red teaming workshop☆217Updated 3 years ago
- Powershell tool to automate Active Directory enumeration.☆1,071Updated 2 weeks ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆551Updated 4 months ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆839Updated last month
- Collection of Windows Privilege Escalation (Analyse/PoC/Exploit)☆367Updated 3 months ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,171Updated last year
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆287Updated 3 years ago
- A tool for generating multiple types of NTLMv2 hash theft files by Jacob Wilkin (Greenwolf)☆1,087Updated 9 months ago
- The Hunt for Malicious Strings☆1,173Updated 2 years ago
- This repo contains some Amsi Bypass methods i found on different Blog Posts.☆1,852Updated 3 months ago
- Certified Red Team Operator☆384Updated 2 years ago
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆372Updated 4 years ago
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆703Updated last year
- Labs for Practical Malware Analysis & Triage☆937Updated last month