timip / OSEELinks
OSEE Preparation
☆186Updated 6 years ago
Alternatives and similar repositories for OSEE
Users that are interested in OSEE are comparing it to the libraries listed below
Sorting:
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆145Updated 4 years ago
- Collection of resources for my preparation to take the OSEE certification.☆284Updated 4 years ago
- ☆310Updated 3 years ago
- Collection of things made during my preparation to take on OSEE☆100Updated 6 years ago
- ☆146Updated 5 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆233Updated 5 years ago
- ☆195Updated 7 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆143Updated 3 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆150Updated 5 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- ☆189Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆322Updated 2 years ago
- collect for learning cases☆592Updated last year
- esoteric☆55Updated 4 years ago
- Vulnerability examples.☆408Updated last year
- Automating juicy potato local privilege escalation exploit for penetration testers☆146Updated 4 years ago
- WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift☆33Updated 3 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 5 years ago
- Changes for Visual Studio 2013☆119Updated 10 years ago
- Ultimate File Transfer List☆62Updated 2 years ago
- Curated knowledge base of exploitation techniques, reverse engineering workflows, and fuzzing insights — built for repeatable, real-world…☆50Updated 3 months ago
- ☆265Updated 2 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- ☆27Updated 5 years ago
- Windows Kernel Exploits☆65Updated 7 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- ☆47Updated 8 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆254Updated 2 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 5 years ago