timip / OSEELinks
OSEE Preparation
☆192Updated 6 years ago
Alternatives and similar repositories for OSEE
Users that are interested in OSEE are comparing it to the libraries listed below
Sorting:
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- Collection of resources for my preparation to take the OSEE certification.☆303Updated 5 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- ☆317Updated 3 years ago
- ☆199Updated 8 years ago
- ☆145Updated 6 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆152Updated 6 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆237Updated 5 years ago
- esoteric☆56Updated 5 years ago
- collect for learning cases☆595Updated last year
- ☆197Updated last year
- Vulnerability examples.☆412Updated last year
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- Automatic exploit generation for simple linux pwn challenges.☆321Updated 2 years ago
- A curated list of resources for the OSED journey.☆71Updated 3 years ago
- Knowledge Base of Exploitation Techniques☆60Updated 8 months ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆145Updated 4 years ago
- WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift☆33Updated 4 years ago
- ☆272Updated 2 years ago
- The best resources for learning exploit development☆122Updated 6 years ago
- A curated collection of resources that may be beneficial for anyone pursuing the OSCE.☆46Updated 3 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30Updated 5 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆78Updated 5 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 5 years ago
- Exploit Development, Reverse Engineering & Cryptography☆257Updated 4 months ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆255Updated 3 years ago
- RE / Binary Exploitation Resources☆72Updated 8 years ago
- Token Privilege Research☆867Updated 8 years ago
- x64 Windows Exploit Development☆116Updated last year