nullg0re / Experienced-Pentester-OSEP
☆390Updated 4 years ago
Alternatives and similar repositories for Experienced-Pentester-OSEP:
Users that are interested in Experienced-Pentester-OSEP are comparing it to the libraries listed below
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆212Updated 4 years ago
- Active Directory Labs/exams Review☆253Updated 4 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆530Updated 8 months ago
- This repository contains previous material necessary to opt for the OSEP (Evasion Techniques and Breaching Defenses) certification☆153Updated 4 years ago
- My OSCP notes☆219Updated 8 months ago
- PEN-300 collection to help you on your exam.☆405Updated last year
- ☆183Updated last year
- ☆242Updated 2 years ago
- Notes compiled for the OSCP exam.☆146Updated 3 years ago
- ☆215Updated 4 years ago
- MS17-010☆270Updated 2 years ago
- Stuff done in preparation for AWAE course and OSWE certification☆151Updated 4 years ago
- Malware development for red teaming workshop☆217Updated 3 years ago
- Custom Query list for the Bloodhound GUI based off my cheatsheet☆767Updated 2 years ago
- Markdown reporting templates and Pandoc styling references to generate sleek reports for OSCP/PWK with little effort.☆201Updated 3 years ago
- Windows Local Privilege Escalation from Service Account to System☆768Updated 5 years ago
- Kerberos Resource-Based Constrained Delegation Attack from Outside using Impacket☆528Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆207Updated 4 years ago
- ☆158Updated 3 years ago
- Collection of resources for my preparation to take the OSEE certification.☆271Updated 4 years ago
- List of Stuff I did to get through the OSCP :D☆249Updated 2 years ago
- Collection of things made during my OSCP journey☆257Updated 7 years ago
- Lists who can read any gMSA password blobs and parses them if the current user has access.☆265Updated last year
- Recover the default privilege set of a LOCAL/NETWORK SERVICE account☆603Updated 4 years ago
- OSWE Preparation☆608Updated 2 years ago
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆197Updated 2 years ago
- ☆660Updated last month
- Collection of some of my own tools with other great open source tools out there packaged into a powershell module☆144Updated 2 years ago
- Mind maps / flow charts to help with privilege escalation on the OSCP.☆372Updated 4 years ago
- Juicy Potato for x86 Windows☆118Updated 5 years ago