timip / OSEELinks
OSEE Preparation
☆191Updated 6 years ago
Alternatives and similar repositories for OSEE
Users that are interested in OSEE are comparing it to the libraries listed below
Sorting:
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- Collection of resources for my preparation to take the OSEE certification.☆297Updated 5 years ago
- ☆316Updated 3 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- ☆199Updated 7 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆151Updated 5 years ago
- ☆145Updated 5 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆236Updated 5 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- Vulnerability examples.☆412Updated last year
- collect for learning cases☆595Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆321Updated 2 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- ☆195Updated last year
- esoteric☆54Updated 5 years ago
- WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift☆33Updated 4 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆77Updated 5 years ago
- Knowledge Base of Exploitation Techniques☆57Updated 7 months ago
- A curated list of resources for the OSED journey.☆70Updated 3 years ago
- ☆47Updated 8 years ago
- Changes for Visual Studio 2013☆118Updated 10 years ago
- Windows Kernel Exploits☆69Updated 8 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆227Updated 4 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆145Updated 4 years ago
- ☆157Updated 2 months ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆255Updated 3 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- Ultimate File Transfer List☆66Updated 3 years ago