nullg0re / Experienced-Pentester-OSEPLinks
☆416Updated 4 years ago
Alternatives and similar repositories for Experienced-Pentester-OSEP
Users that are interested in Experienced-Pentester-OSEP are comparing it to the libraries listed below
Sorting:
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆223Updated 4 years ago
- Active Directory Labs/exams Review☆259Updated 4 years ago
- This repository contains previous material necessary to opt for the OSEP (Evasion Techniques and Breaching Defenses) certification☆170Updated 4 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆567Updated last year
- ☆219Updated 5 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆802Updated 2 years ago
- ☆276Updated 3 years ago
- Notes compiled for the OSCP exam.☆155Updated 3 years ago
- Malware development for red teaming workshop☆222Updated 3 years ago
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆382Updated 4 years ago
- ☆189Updated last year
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆1,322Updated 3 weeks ago
- Markdown reporting templates and Pandoc styling references to generate sleek reports for OSCP/PWK with little effort.☆205Updated 4 years ago
- ☆161Updated 3 years ago
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆145Updated 2 years ago
- Utility to enumerate users, groups and computers from a Windows domain through LDAP queries☆387Updated 4 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆554Updated last week
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆212Updated 2 years ago
- ☆723Updated 6 months ago
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆627Updated 5 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆325Updated last year
- An script to perform kerberos bruteforcing by using impacket☆454Updated 3 years ago
- Juicy Potato for x86 Windows☆123Updated 5 years ago
- ☆355Updated 4 years ago
- Bypass for PowerShell Constrained Language Mode☆398Updated 3 years ago
- MS17-010☆271Updated 3 years ago
- Windows Local Privilege Escalation from Service Account to System☆847Updated 5 years ago
- List of Stuff I did to get through the OSCP :D☆285Updated 2 years ago
- Helper script for spawning a minimal Ubuntu 16.04 container ready for building kernel exploits (~4.x)☆146Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆211Updated 5 years ago