All Projects → The-Lynx-Team → Oscp

The-Lynx-Team / Oscp

Our OSCP repo: from popping shells to mental health.

Programming Languages

javascript
184084 projects - #8 most used programming language

Projects that are alternatives of or similar to Oscp

Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (+180.28%)
Mutual labels:  pentesting, oscp
Suid3num
A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
Stars: ✭ 342 (+381.69%)
Mutual labels:  pentesting, oscp
Oscp Cheat Sheet
This is my OSCP cheat sheet made by combining a lot of different resources online with a little bit of tweaking. I used this cheat sheet during my exam (Fri, 13 Sep 2019) and during the labs. I can proudly say it helped me pass so I hope it can help you as well ! Good Luck and Try Harder
Stars: ✭ 216 (+204.23%)
Mutual labels:  pentesting, oscp
Redteam Tactics And Techniques
Red Teaming Tactics and Techniques
Stars: ✭ 2,190 (+2984.51%)
Mutual labels:  pentesting, oscp
Penetration Testing Study Notes
Penetration Testing notes, resources and scripts
Stars: ✭ 461 (+549.3%)
Mutual labels:  pentesting, oscp
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (+133.8%)
Mutual labels:  pentesting, oscp
Cheatsheet God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+4859.15%)
Mutual labels:  pentesting, oscp
Pentest Book
Stars: ✭ 266 (+274.65%)
Mutual labels:  pentesting, oscp
Justtryharder
JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (+533.8%)
Mutual labels:  pentesting, oscp
Awesome Privilege Escalation
A curated list of awesome privilege escalation
Stars: ✭ 413 (+481.69%)
Mutual labels:  pentesting, oscp
Linux Smart Enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (+2654.93%)
Mutual labels:  pentesting, oscp
Linuxprivchecker
linuxprivchecker.py -- a Linux Privilege Escalation Check Script
Stars: ✭ 715 (+907.04%)
Mutual labels:  pentesting, oscp
Oscp Prep
my oscp prep collection
Stars: ✭ 105 (+47.89%)
Mutual labels:  pentesting, oscp
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (+171.83%)
Mutual labels:  pentesting, oscp
Oscp Human Guide
My own OSCP guide
Stars: ✭ 358 (+404.23%)
Mutual labels:  pentesting, oscp
Dostoevsky Pentest Notes
Notes for taking the OSCP in 2097. Read in book form on GitBook
Stars: ✭ 495 (+597.18%)
Mutual labels:  pentesting, oscp
Awesome Oscp
A curated list of awesome OSCP resources
Stars: ✭ 804 (+1032.39%)
Mutual labels:  pentesting, oscp
Nmap Nse Info
Browse and search through nmap's NSE scripts.
Stars: ✭ 54 (-23.94%)
Mutual labels:  pentesting
Needle
The iOS Security Testing Framework
Stars: ✭ 1,122 (+1480.28%)
Mutual labels:  pentesting
Sudo killer
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+1411.27%)
Mutual labels:  oscp
████████╗██╗  ██╗███████╗     ██╗  ██╗   ██╗███╗   ██╗██╗  ██╗    ████████╗███████╗ █████╗ ███╗   ███╗
╚══██╔══╝██║  ██║██╔════╝     ██║  ╚██╗ ██╔╝████╗  ██║╚██╗██╔╝    ╚══██╔══╝██╔════╝██╔══██╗████╗ ████║
   ██║   ███████║█████╗       ██║   ╚████╔╝ ██╔██╗ ██║ ╚███╔╝        ██║   █████╗  ███████║██╔████╔██║
   ██║   ██╔══██║██╔══╝       ██║    ╚██╔╝  ██║╚██╗██║ ██╔██╗        ██║   ██╔══╝  ██╔══██║██║╚██╔╝██║
   ██║   ██║  ██║███████╗     ███████╗██║   ██║ ╚████║██╔╝ ██╗       ██║   ███████╗██║  ██║██║ ╚═╝ ██║
   ╚═╝   ╚═╝  ╚═╝╚══════╝     ╚══════╝╚═╝   ╚═╝  ╚═══╝╚═╝  ╚═╝       ╚═╝   ╚══════╝╚═╝  ╚═╝╚═╝     ╚═╝  
			       ---- lynxes just wanna have fun ----

OSCP

We maintain this repo with the aim to gather all the info that we’d found useful and interesting for the OSCP. We also collect material from other resources (websites, courses, blogs, git repos, books, etc).

Before continue: we are still working on this repo as we go on with our OSCP journey. This means we'll add or remove parts without giving notice. Furthermore, this is not intended to be a comprehensive repo, cross-reference and information gathering are your friends.

TOC

How to navigate the repo

The repo is structured by this way:

|── Box template
├── Methodologies
├── README.md
└── troubleshooting.md
  • Box template: here you can see how we organize our work flow
  • Methodologies: here you can find a checklist for each phase (recon/enum, postexploit, privesc, etc)
  • README: where you can find a list of useful links
  • troubleshooting.md: is a ledger to record all the tecnhical issues:solution we have found along the way

Be aware: we use Obsidian as note taking application. This justifies the directory structure and how we format files. We think the graph view provided by Obsidian is a pleasant way to have a visual view of the data we gather. So if you use our checklists, we suggest you run them on Obsidian for a better experience.

Official Offensive Security References

Blog

Reddit

GitHub repos

Webbing

Genereal useful resources

Buffer Overflow

PrivEsc

General

YouTube

Gamified Learning

Linux Capabilities

Methodologies

Automation scripts

Tools

Cheat sheets and Wordlists

HackTheBox

VulnHub

Reporting

Mental and Physical Health

Ok, this is not about popping shells, cracking codes, and launching exploits. Your health is more important than knowing how to pop a shell. If you are under burnout, if you can’t concentrate, if you can’t free your minds and visualize your target, all the above stuff is useless. You should find a spot to read the below links and do your own research. The InfoSec community is an enormous family, you’ll always find someone ready to help you.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].