nullg0re / Experienced-Pentester-OSEPLinks
☆399Updated 4 years ago
Alternatives and similar repositories for Experienced-Pentester-OSEP
Users that are interested in Experienced-Pentester-OSEP are comparing it to the libraries listed below
Sorting:
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆219Updated 4 years ago
- Active Directory Labs/exams Review☆252Updated 4 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆553Updated 10 months ago
- This repository contains previous material necessary to opt for the OSEP (Evasion Techniques and Breaching Defenses) certification☆163Updated 4 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆781Updated 2 years ago
- ☆217Updated 4 years ago
- Notes compiled for the OSCP exam.☆152Updated 3 years ago
- ☆257Updated 3 years ago
- List of Stuff I did to get through the OSCP :D☆266Updated 2 years ago
- ☆184Updated last year
- My OSCP notes☆220Updated 10 months ago
- MS17-010☆271Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆208Updated 5 years ago
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆377Updated 4 years ago
- Malware development for red teaming workshop☆219Updated 3 years ago
- Collection of resources for my preparation to take the OSEE certification.☆276Updated 4 years ago
- Markdown reporting templates and Pandoc styling references to generate sleek reports for OSCP/PWK with little effort.☆204Updated 4 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆144Updated 2 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆286Updated last year
- Stuff done in preparation for AWAE course and OSWE certification☆152Updated 4 years ago
- ☆353Updated 4 years ago
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆206Updated 2 years ago
- ☆687Updated 4 months ago
- ☆160Updated 3 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆542Updated 2 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆211Updated 2 years ago
- Windows Local Privilege Escalation from Service Account to System☆808Updated 5 years ago
- ☆142Updated last year
- Checks running processes, process metadata, Dlls loaded into your current process and the each DLLs metadata, common install directories,…☆714Updated last year
- Windows Kernel Exploits☆66Updated 7 years ago