notable code snippets for Offensive Security's PEN-300 (OSEP) course
https://github.com/chvancooten/OSEP-Code-Snippets?s=09
https://github.com/chvancooten/OSEP-Code-Snippets?s=09
A FREE comprehensive reverse engineering tutorial covering x86, x64, 32-bit ARM & 64-bit ARM architectures
https://github.com/mytechnotalent/Reverse-Engineering
https://github.com/mytechnotalent/Reverse-Engineering
Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together
https://github.com/signorrayan/RedTeam_toolkit
Offensive tooling notes and experiments in AutoIt_v3
https://github.com/V1V1/OffensiveAutoIt
https://github.com/signorrayan/RedTeam_toolkit
Offensive tooling notes and experiments in AutoIt_v3
https://github.com/V1V1/OffensiveAutoIt
Run binaries straight from memory in Linux
https://github.com/liamg/memit
403/401 Bypass Methods + Bash Automation + Your Support ;)
https://github.com/Dheerajmadhukar/4-ZERO-3
https://github.com/liamg/memit
403/401 Bypass Methods + Bash Automation + Your Support ;)
https://github.com/Dheerajmadhukar/4-ZERO-3
information about EDRs that can be useful during red team exercise
https://github.com/Mr-Un1k0d3r/EDRs
AV/EDR evasion via direct system calls
https://github.com/jthuraisamy/SysWhispers2
https://github.com/Mr-Un1k0d3r/EDRs
AV/EDR evasion via direct system calls
https://github.com/jthuraisamy/SysWhispers2
#cracken a fast password wordlist generator, Smartlist creation and password hybrid-mask analysis tool written in pure safe Rust
https://github.com/shmuelamar/cracken
#karma_v2 is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)
https://github.com/Dheerajmadhukar/karma_v2
https://github.com/shmuelamar/cracken
#karma_v2 is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)
https://github.com/Dheerajmadhukar/karma_v2
The fastest and safest AV1 encoder
https://github.com/xiph/rav1e
Safe, fast, small crypto using Rust
https://github.com/briansmith/ring
https://github.com/xiph/rav1e
Safe, fast, small crypto using Rust
https://github.com/briansmith/ring
proxylogon, proxyshell, proxyoracle and proxytoken full chain exploit tool
https://github.com/FDlucifer/Proxy-Attackchain
ProxyVulns
https://github.com/hosch3n/ProxyVulns
https://github.com/FDlucifer/Proxy-Attackchain
ProxyVulns
https://github.com/hosch3n/ProxyVulns
VMware vCenter 7.0.2.00100 unauth Arbitrary File Read + SSRF + Reflected XSS
https://github.com/l0ggg/VMware_vCenter
https://github.com/l0ggg/VMware_vCenter
A Visual Studio template used to create #Cobalt_Strike BOFs
https://github.com/securifybv/Visual-Studio-BOF-template
#Cobalt_Strike BOF - Bypass AMSI in a remote process with code injection
https://github.com/boku7/injectAmsiBypass
Tool for working with Direct System Calls in #Cobalt_Strike's Beacon Object Files (BOF) via Syswhispers2
https://github.com/Sh0ckFR/InlineWhispers2
A Beacon Object File (BOF) for #Cobalt_Strike which uses direct system calls to enable WDigest credential caching
https://github.com/outflanknl/WdToggle
https://github.com/securifybv/Visual-Studio-BOF-template
#Cobalt_Strike BOF - Bypass AMSI in a remote process with code injection
https://github.com/boku7/injectAmsiBypass
Tool for working with Direct System Calls in #Cobalt_Strike's Beacon Object Files (BOF) via Syswhispers2
https://github.com/Sh0ckFR/InlineWhispers2
A Beacon Object File (BOF) for #Cobalt_Strike which uses direct system calls to enable WDigest credential caching
https://github.com/outflanknl/WdToggle
scanner that detects #CVE-2021-21980 vulnerabilities VMware vCenter earlier versions (7.0.2.00100)
https://github.com/Osyanina/westone-CVE-2021-21980-scanner
Plex media server local privilige escalation poc #CVE-2021-42835
https://github.com/netanelc305/PlEXcalaison
Python tool for exploiting #CVE-2021-35616
https://github.com/Ofirhamam/OracleOTM
https://github.com/Osyanina/westone-CVE-2021-21980-scanner
Plex media server local privilige escalation poc #CVE-2021-42835
https://github.com/netanelc305/PlEXcalaison
Python tool for exploiting #CVE-2021-35616
https://github.com/Ofirhamam/OracleOTM
Master the command line in one page
https://github.com/jlevy/the-art-of-command-line
All sysmon event types and their fields explained
https://github.com/olafhartong/sysmon-cheatsheet
https://github.com/jlevy/the-art-of-command-line
All sysmon event types and their fields explained
https://github.com/olafhartong/sysmon-cheatsheet