whoisflynn / Oscp Exam Report Template
Modified template for the OSCP Exam and Labs. Used during my passing attempt
Stars: ✭ 506
Projects that are alternatives of or similar to Oscp Exam Report Template
Oscp Exam Report Template Markdown
📙 Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
Stars: ✭ 2,066 (+308.3%)
Mutual labels: oscp, offensive-security
Oscp Pwk
This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.
Stars: ✭ 406 (-19.76%)
Mutual labels: oscp, offensive-security
Redteam Tactics And Techniques
Red Teaming Tactics and Techniques
Stars: ✭ 2,190 (+332.81%)
Mutual labels: oscp, offensive-security
Rapidscan
🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+53.16%)
Mutual labels: oscp, offensive-security
Vanquish
Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (-11.26%)
Mutual labels: oscp, offensive-security
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+260.47%)
Mutual labels: oscp, offensive-security
Awesome Oscp
A curated list of awesome OSCP resources
Stars: ✭ 804 (+58.89%)
Mutual labels: oscp, offensive-security
aterm
It records your terminal, then lets you upload to ASHIRT
Stars: ✭ 17 (-96.64%)
Mutual labels: reporting, offensive-security
RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
Stars: ✭ 2,991 (+491.11%)
Mutual labels: offensive-security, oscp
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+51.58%)
Mutual labels: oscp, offensive-security
php-reverse-shell
PHP shells that work on Linux OS, macOS, and Windows OS.
Stars: ✭ 274 (-45.85%)
Mutual labels: offensive-security, oscp
Buffer overflow
Don't let buffer overflows overflow your mind
Stars: ✭ 131 (-74.11%)
Mutual labels: oscp, offensive-security
Pwk Oscp Preparation Roadmap
Roadmap for preparing for OSCP, anyone is free to use this, and also feedback and contributions are welcome
Stars: ✭ 142 (-71.94%)
Mutual labels: oscp, offensive-security
OSCP-A-Step-Forward
Opening the door, one reverse shell at a time
Stars: ✭ 126 (-75.1%)
Mutual labels: offensive-security, oscp
oscp-omnibus
A collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (-90.91%)
Mutual labels: offensive-security, oscp
Ignition Contracts
The contracts used to display solutions on Ignition and Flare
Stars: ✭ 372 (-26.48%)
Mutual labels: reporting
Vulnhub Ctf Writeups
This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on hackingarticles.
Stars: ✭ 368 (-27.27%)
Mutual labels: oscp
Penetration Testing Study Notes
Penetration Testing notes, resources and scripts
Stars: ✭ 461 (-8.89%)
Mutual labels: oscp
OSCP Report Templates
This repo contains my templates for the OSCP Lab and OSCP Exam Reports. The reports are nearly identical, with minor variations between them.
I wanted to share these templates with the community to help alleviate some of the stress people feel when they start their report.
Notable Edits - Lab Report
- Updated version to 3.2
- Updated the Table of Contents to reflect the new data flow of the document
- Added more information to the High Level Summary
- Added a total of 10 machine sections. (Copy and paste these if you are reporting more than the 10 machines required for the lab report)
- Updated 3.1 Information Gathering (For each machine, I create a link to the associated machine)
- Updated the documentation flow. Each Machine is given its own section. Creates a boot to root walkthrough feel for each machine
- Added the Service Enumeration table to each machine section instead of one table for the entire report
- Added a header for Nmap scan results (screenshot)
- Added a header for Initial Shell Screenshot
- Added headers for Proof.txt Contents and the Proof.txt Screenshot
- Added Appendix 1 - Proof Contents. This is an easy way to track those keys
- Added Appendix 2 - PWK Course Exercises
- Included all the headers for the requested exercises. The exercises are not included, as they are present in the course material
Notable Edits - Exam Report
- Updated version to 3.2
- Updated the Table of Contents to reflect the new data flow of the document
- Added more information to the High Level Summary
- Updated 3.1 Information Gathering (For each machine, I create a link to the associated machine)
- Updated the documentation flow. Each Machine is given its own section. Creates a boot to root walkthrough feel for each machine
- Added the Service Enumeration table to each machine section instead of one table for the entire report
- Added a header for Nmap scan results (screenshot)
- Added headers for Local.txt Contents (the hash) and Local.txt Screenshot
- Added headers for Proof.txt Contents and the Proof.txt Screenshot
- Created a machine entry for the Buffer Overflow machine.
- Added Appendix 1 - Proof and Local Contents. This is an easy way to track those keys
- Added Appendix 2 - Metasploit/Meterpreter Usage. If you use the allowance on the exam, this is an easy way to document it
- Added Appendix 3 - Completed Buffer Overflow Code
Notice
Original template was created by Offensive Security and can be found here: https://www.offensive-security.com/pwk-online/PWKv1-REPORT.doc
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].