Outils d'utilisateurs

Outils du Site


oscp_pwk

Différences

Cette page vous donne les différences entre la révision choisie et la version actuelle de la page.

Lien vers cette vue

oscp_pwk [2020/07/23 14:13]
M0N5T3R
oscp_pwk [2023/03/29 16:22] (Version actuelle)
M0N5T3R
Ligne 1: Ligne 1:
-Buffer Overflows for OSCP https://appsecradar.net/posts/simplifying-buffer-overflows-for-oscp/+**OSCP tools** 
 + 
 +SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase. It allows the tester to save time by having point-and-click access to his toolkit and by displaying all tool output in a convenient way. If little time is spent setting up commands and tools, more time can be spent focusing on analysing results. 
 +https://sparta.secforce.com/ 
 + 
 + 
 +A reconnaissance tool made for the OSCP engagements to automate information gathering and service enumeration whilst creating a directory structure to store results, findings and exploits used for each host.. https://github.com/mikaelkall/massrecon 
 + 
 + 
 + 
 +A reconnaissance tool made for the OSCP labs to automate information gathering and service enumeration whilst creating a directory structure to store results, findings and exploits used for each host, recommended commands to execute and directory structures for storing loot and flags. https://github.com/codingo/Reconnoitre 
 + 
 + 
 +The main goal for this script is to automate all of the process of recon/enumeration that is run every time, and instead focus our attention on real pen testing.  https://github.com/rkhal101/nmapAutomator 
 + 
 + 
 + 
 + 
 +JAWS is PowerShell script designed to help penetration testers (and CTFers) quickly identify potential privilege escalation vectors on Windows systems https://github.com/411Hall/JAWS 
 + 
 +https://github.com/m8r0wn/nullinux 
 +Nullinux is an internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB 
 + 
 +Usefull list of Hacking Windows tools https://xz.aliyun.com/t/6498 
 + 
 + 
 + 
 +**OSCP notes** 
 + 
 +https://github.com/sphinxs329/OSCP-PWK-Notes-Public 
 + 
 +https://github.com/tbowman01/OSCP-PWK-Notes-Public 
 + 
 +http://hackingandsecurity.blogspot.ca/2016/04/oscp-related-notes.html 
 + 
 + 
 +https://oscp.infosecsanyam.in/ 
 + 
 + 
 +http://sejalivre.org/OSCP/OSCP_Notes.html 
 + 
 +https://securism.wordpress.com/oscp-notes-exploitation/ 
 + 
 +https://securism.wordpress.com/oscp-notes-buffer-overflow/ 
 + 
 +https://medium.com/@falconspy/useful-oscp-notes-commands-d71b5eda7b02 
 + 
 +https://github.com/hermit-hacker/OSCP-Study-Notes/find/master?q= 
 + 
 +https://github.com/tagnullde/OSCP 
 + 
 + 
 +OSCP Notes : https://github.com/kyawthiha7/oscp_notes 
 + 
 + 
 + 
 + 
 +**OSCP Survival Guide** 
 + 
 +https://github.com/Sturmrufer/OSCP-Survival-Guide_ 
 + 
 + 
 + 
 + 
 + 
 +  
 +**Cheatsheets** 
 + 
 +https://github.com/slyth11907/Cheatsheets 
 + 
 +https://github.com/OlivierLaflamme/Cheatsheet-God 
 + 
 +https://github.com/akenofu/OSCP-Cheat-Sheet 
 + 
 +https://github.com/mohitkhemchandani/OSCP_BIBLE 
 + 
 + 
 +**OSCP Tools** 
 + 
 +https://github.com/cokebottle/oscp-tools 
 + 
 +**OSCP preparation** 
 + 
 +https://github.com/burntmybagel/OSCP-Prep 
 + 
 + 
 +OSCP preparation - Buffer Overflows for OSCP https://appsecradar.net/posts/simplifying-buffer-overflows-for-oscp/ 
 +https://github.com/V1n1v131r4/OSCP-Buffer-Overflow
  
 OSCP preparation https://github.com/RihaMaheshwari/OSCP-Preparation-Material OSCP preparation https://github.com/RihaMaheshwari/OSCP-Preparation-Material
Ligne 20: Ligne 107:
 OSCP-like Vulnhub/HTB VMs OSCP-like Vulnhub/HTB VMs
 https://www.tiny.cc/OSCP_PREP/ https://www.tiny.cc/OSCP_PREP/
 +
 +OSCP-like Vulnhub/HTB VMs - 2020
 +https://docs.google.com/spreadsheets/u/1/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/htmlview#
 +
  
  
Ligne 27: Ligne 118:
 OSCP-like Vulnhub/HTB VMs OSCP-like Vulnhub/HTB VMs
 http://www.netmux.com/blog/purple-rain-attack http://www.netmux.com/blog/purple-rain-attack
 +
 +OSCP like VM for the exam (set of 5 VMs)
 +https://github.com/ajdumanhug/oscp-practice
  
  
oscp_pwk.1595506409.txt.gz · Dernière modification: 2020/07/23 14:13 par M0N5T3R