nop-tech / OSEDLinks
Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)
☆772Updated last year
Alternatives and similar repositories for OSED
Users that are interested in OSED are comparing it to the libraries listed below
Sorting:
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆590Updated last year
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆743Updated 10 months ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆726Updated 6 months ago
- PEN-300 collection to help you on your exam.☆680Updated 3 months ago
- Windows Local Privilege Escalation Cookbook☆1,217Updated 10 months ago
- ☆1,066Updated last year
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,366Updated 4 months ago
- ☆195Updated last year
- Awesome EDR Bypass Resources For Ethical Hacking☆1,354Updated last month
- Collection of resources for my preparation to take the OSEE certification.☆297Updated 5 years ago
- Tips on how to write exploit scripts (faster!)☆528Updated last year
- ☆424Updated 5 years ago
- Certified Red Team Operator☆439Updated 3 years ago
- Collection of Windows Privilege Escalation (Analyse/PoC/Exploit)☆461Updated last year
- Centralized resource for listing and organizing known injection techniques and POCs☆658Updated 2 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆419Updated 6 months ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆1,359Updated last year
- Red team Interview Questions☆719Updated 7 months ago
- EDR Lab for Experimentation Purposes☆1,384Updated 3 weeks ago
- Windows Local Privilege Escalation from Service Account to System☆880Updated 5 years ago
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆229Updated 3 years ago
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆385Updated 2 years ago
- ☆774Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,197Updated 2 years ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆598Updated 4 months ago
- Powershell tool to automate Active Directory enumeration.☆1,255Updated 2 months ago
- Malware development for red teaming workshop☆224Updated 4 years ago
- ☆616Updated 2 weeks ago
- Kernel mode WinDbg extension and PoCs for token privilege investigation.☆891Updated 10 months ago
- My collection of malware dev links☆298Updated 5 months ago