rootshooter / osep-code-dump-2022Links
Code dump from PEN-300/OSEP updated 2022
☆42Updated 3 years ago
Alternatives and similar repositories for osep-code-dump-2022
Users that are interested in osep-code-dump-2022 are comparing it to the libraries listed below
Sorting:
- Payload Generation Framework☆98Updated last year
- AV Evasion Techniques☆83Updated 3 years ago
- A variety of AV evasion techniques written in C# for practice.☆98Updated 4 years ago
- ☆75Updated 10 months ago
- A collection of code snippets built to assist with breaking chains.☆126Updated last year
- ☆39Updated 4 years ago
- Shellcode generation and encoding utility☆24Updated 3 years ago
- SeRestorePrivilege to SYSTEM☆132Updated 4 years ago
- Attempt at Obfuscated version of SharpCollection☆242Updated 2 months ago
- SeManageVolumePrivilege to SYSTEM☆146Updated 2 years ago
- ☆167Updated 3 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- PowerShell runner for executing malicious payloads in order to bypass Windows Defender.☆73Updated 4 years ago
- The BackupOperatorToolkit contains different techniques allowing you to escalate from Backup Operator to Domain Admin☆178Updated 2 years ago
- Patching AmsiOpenSession by forcing an error branching☆154Updated 2 years ago
- Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods☆129Updated 2 years ago
- ☆120Updated 10 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 3 years ago
- A small tool to convert Base64-encoded .kirbi tickets from Rubeus into .ccache files for Impacket☆72Updated 5 years ago
- ☆216Updated last year
- A simple POC that abuses Backup Operator privileges to remote dump SAM, SYSTEM, and SECURITY☆89Updated 3 years ago
- My implementation of the GIUDA project in C++☆188Updated 2 years ago
- D/Invoke standalone shellcode runners☆39Updated 2 years ago
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆207Updated 2 years ago
- Useful Cobalt Strike Beacon Object Files (BOFs) used during red teaming and penetration testing engagements.☆138Updated 3 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆300Updated 2 years ago
- ☆169Updated last year
- ☆28Updated 3 years ago
- Python based Bloodhound data converter from the legacy pre 4.1 format to 4.1+ format☆64Updated 3 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆125Updated 5 years ago