nullg0re / Experienced-Pentester-OSEPLinks
☆423Updated 4 years ago
Alternatives and similar repositories for Experienced-Pentester-OSEP
Users that are interested in Experienced-Pentester-OSEP are comparing it to the libraries listed below
Sorting:
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆226Updated 4 years ago
- Active Directory Labs/exams Review☆260Updated 4 years ago
- This repository contains previous material necessary to opt for the OSEP (Evasion Techniques and Breaching Defenses) certification☆175Updated 4 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆579Updated last year
- ☆220Updated 5 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆808Updated 2 years ago
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆389Updated 4 years ago
- An script to perform kerberos bruteforcing by using impacket☆456Updated 3 years ago
- ☆163Updated 3 years ago
- Collection of Pentest Notes and Cheatsheets☆384Updated 4 months ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆341Updated last year
- List of Stuff I did to get through the OSCP :D☆302Updated 3 years ago
- Notes compiled for the OSCP exam.☆158Updated 3 years ago
- Markdown reporting templates and Pandoc styling references to generate sleek reports for OSCP/PWK with little effort.☆205Updated 4 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆567Updated 2 months ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆144Updated 3 years ago
- ☆355Updated 4 years ago
- ☆194Updated last year
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,348Updated 2 months ago
- MS17-010☆272Updated 3 years ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆649Updated 5 years ago
- Juicy Potato for x86 Windows☆128Updated 6 years ago
- ☆281Updated 3 years ago
- Windows Kernel Exploits☆68Updated 8 years ago
- Bypass for PowerShell Constrained Language Mode☆401Updated 3 years ago
- ☆732Updated 8 months ago
- Malware development for red teaming workshop☆223Updated 3 years ago
- Windows Local Privilege Escalation from Service Account to System☆873Updated 5 years ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆215Updated 2 years ago
- Don't let buffer overflows overflow your mind☆444Updated 5 years ago