My journey and notes on learning Offensive Security from the ground up
☆21Dec 22, 2025Updated 3 months ago
Alternatives and similar repositories for Offensive-Security
Users that are interested in Offensive-Security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Jan 11, 2023Updated 3 years ago
- ☆38Apr 7, 2023Updated 2 years ago
- offensive security scripts and documentation☆30Mar 9, 2026Updated 2 weeks ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆48Nov 9, 2023Updated 2 years ago
- ☆24Feb 7, 2025Updated last year
- A collection of small scripts and tools for deobfuscation and malware analysis.☆67Mar 27, 2023Updated 2 years ago
- abusing windows toast notifications for fun and user manipulation☆57Updated this week
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆45Oct 2, 2023Updated 2 years ago
- Public Exploits☆10Apr 6, 2021Updated 4 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- If you a security engineer or an aspirant Security professional then Setting up a Wazuh home lab environment is an excellent way for SOC …☆18Mar 27, 2024Updated last year
- ☆19Mar 4, 2023Updated 3 years ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- ☆30Apr 15, 2023Updated 2 years ago
- A linux exploitation skill facilitates heap address leaking or performs overflow from BSS to heap☆20May 3, 2024Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- public archive for corCTF 2023☆18Aug 6, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Example of C# heap injector for x64 and x86 shellcodes☆14Jan 1, 2023Updated 3 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆44Jul 13, 2023Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆94Dec 2, 2025Updated 3 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- Some basic info, resources, and code snippets about windows kernel exploitation☆17Jul 18, 2025Updated 8 months ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Jun 18, 2023Updated 2 years ago
- jqctf2023☆16Dec 3, 2023Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- ☆14Aug 13, 2019Updated 6 years ago
- ☆42Sep 18, 2025Updated 6 months ago
- ☆15Jul 13, 2023Updated 2 years ago
- Recon(Amass, Naabu, Nuclei) workflow with Github Actions☆17Nov 12, 2024Updated last year
- Uma lista de recursos para quem deseja aprender sobre Physical Pentesting☆12Jul 28, 2025Updated 7 months ago
- miscellaneous sploit scripts/hacks☆18Feb 3, 2025Updated last year