BadB
Professional
- Messages
- 2,550
- Reaction score
- 2,707
- Points
- 113
OSCP Course Review
Offensive Security’s PWB and OSCP — My Experience
OSCP Journey
scriptkidd1e.wordpress.com
Down with OSCP
Jolly Frogs - Tech Exams (Very thorough)
www.techexams.net
OSCP Inspired VMs and Walkthroughs
www.hackthebox.eu
www.root-me.org
www.vulnhub.com
Walk through of Tr0ll-1 - Inspired by on the Trolling found in the OSCP exam
highon.coffee
Another walk through for Tr0ll-1
null-byte.wonderhowto.com
Taming the troll - walkthrough
leonjza.github.io
Troll download on Vuln Hub
Sickos - Walkthrough:
Sickos - Inspired by Labs in OSCP
www.vulnhub.com
Lord of the Root Walk Through
highon.coffee
Lord Of The Root: 1.0.1 - Inspired by OSCP
www.vulnhub.com
Tr0ll-2 Walk Through
leonjza.github.io
Tr0ll-2
Cheat Sheets
Penetration Tools Cheat Sheet
highon.coffee
Pen Testing Bookmarks
OSCP Cheatsheets
github.com
CEH Cheatsheet
Net Bios Scan Cheat Sheet
Reverse Shell Cheat Sheet
highon.coffee
NMap Cheat Sheet
highon.coffee
Linux Commands Cheat Sheet
highon.coffee
Security Hardening CentO 7
highon.coffee
MetaSploit Cheatsheet
Google Hacking Database:
www.exploit-db.com
Windows Assembly Language Mega Primer
Linux Assembly Language Mega Primer
Metasploit Cheat Sheet
A bit dated but most is still relevant
hackingandsecurity.blogspot.com
NetCat
Essentials
Exploit-db
www.exploit-db.com
SecurityFocus - Vulnerability database
www.securityfocus.com
Vuln Hub - Vulnerable by design
www.vulnhub.com
Exploit Exercises
exploit-exercises.com
SecLists - collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads
github.com
Security Tube
Metasploit Unleashed - free course on how to use Metasploit
www.offensive-security.com
0Day Security Enumeration Guide http://www.0daysecurity.com/penetration-testing/enumeration.html
Github IO Book - Pen Testing Methodology
Windows Privledge Escalation
Fuzzy Security http://www.fuzzysecurity.com/tutorials/16.html
accesschk.exe https://technet.microsoft.com/en-us/sysinternals/bb664922
Windows Priv Escalation For Pen Testers https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
Elevating Privileges to Admin and Further https://hackmag.com/security/elevating-privileges-to-administrative-and-further/
Transfer files to windows machines https://blog.netspi.com/15-ways-to-download-a-file/
Windows-Privesc/windows privesc sectalks BNE0x19.pdf https://github.com/codingo/Windows-Privesc/blob/master/windows privesc sectalks BNE0x19.pdf
Offensive Security’s PWB and OSCP — My Experience
Offensive Security's PWB and OSCP - My Experience - Security Sift
My experience with the Offensive Security Penetration Testing with Backtrack (PWB) course and achieving the OSCP certification.
www.securitysift.com
OSCP Journey
OSCP Journey
Update: I am currently slowly migrating my site content to a YouTube channel and will be posting new video content to the YouTube channel regularly instead! Thank you! – Introduction – …
Down with OSCP
Jolly Frogs - Tech Exams (Very thorough)
TechExams Community
Welcome to the TechExams Community! We're proud to offer IT and security pros like you access to one of the largest IT and security certification forums on the web. Whether you stopped by for certification tips or the networking opportunities, we hope to see you online again soon. TechExams is...
OSCP Inspired VMs and Walkthroughs
Hack The Box: The #1 Cybersecurity Performance Center
HTB is the leading Cybersecurity Performance Center for advanced frontline teams to aspiring security professionals & students. Start driving peak cyber performance.
Bienvenue [Root Me : plateforme d'apprentissage dédiée au Hacking et à la Sécurité de l'Information]
Root Me est une plateforme permettant à chacun de tester et d'améliorer ses connaissances dans le domaine de la sécurité informatique et du hacking à travers la publication de challenges, de solutions, d'articles.
Vulnerable By Design ~ VulnHub
VulnHub provides materials allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
Walk through of Tr0ll-1 - Inspired by on the Trolling found in the OSCP exam
Tr0ll 1 Walkthrough
Tr0ll: 1 walkthrough - step by step write up for Tr0ll: 1 a VulnHub Boot2Root challenge.
Another walk through for Tr0ll-1
How to Use NMAP 7 to Discover Vulnerabilities, Launch DoS Attacks and More!
NMAP is an essential tool in any hacker's arsenal. Originally written by Gordon Lyon aka Fydor, it's used to locate hosts and services and create a map of...
Taming the troll - walkthrough
taming the troll
foreword Having recently started the road to OSCP, @Maleus21 released Tr0ll on @VulnHub. I figured since the description was Difficulty: Beginner ; Type: boot2root, I could give it a smash in a evening as a bit of distraction.
Troll download on Vuln Hub
Sickos - Walkthrough:
Sickos - Inspired by Labs in OSCP
SickOs ~ VulnHub
VulnHub provides materials allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
Lord of the Root Walk Through
Lord of the Root Walkthrough CTF
Lord of the Root walkthrough - step by step walkthrough for Lord of the ROot : 2 a VulnHub Boot2Root CTF challenge.
Lord Of The Root: 1.0.1 - Inspired by OSCP
Lord Of The Root ~ VulnHub
VulnHub provides materials allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
Tr0ll-2 Walk Through
another troll tamed solving troll 2
foreword Tr0ll2 is a successor in a boot2root series by @Maleus21 hosted over at VulnHub. Having been able to pwn Tr0ll1, I gave this one a shot too. Here is my experience taming the troll, again.
Tr0ll-2
Cheat Sheets
Penetration Tools Cheat Sheet
Pen Testing Tools Cheat Sheet
Penetration testing tools cheat sheet, a high level overview / quick reference cheat sheet for penetration testing.
Pen Testing Bookmarks
OSCP Cheatsheets
GitHub - slyth11907/Cheatsheets: Helped during my OSCP lab days.
Helped during my OSCP lab days. Contribute to slyth11907/Cheatsheets development by creating an account on GitHub.
CEH Cheatsheet
Net Bios Scan Cheat Sheet
Reverse Shell Cheat Sheet
Reverse Shell Cheat Sheet: PHP, ASP, Netcat, Bash & Python
Reverse Shell Cheat Sheet (Updated: 2024), a list of reverse shells for connecting back on Linux/Windows with PHP, Python, Powershell, nc (Netcat), JSP, Java, Bash, PS etc.
NMap Cheat Sheet
Nmap Cheat Sheet: Commands, Flags, Switches & Examples (2024)
Nmap Cheat Sheet, learn Nmap commands, flags & real world exmaples allowing you to leverage the OG portscanner.
Linux Commands Cheat Sheet
Linux Commands Cheat Sheet
Linux Command Cheat Sheet and examples for penetration testing.
Security Hardening CentO 7
Security Harden CentOS 7
MetaSploit Cheatsheet
Google Hacking Database:
OffSec’s Exploit Database Archive
The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers.
Windows Assembly Language Mega Primer
Linux Assembly Language Mega Primer
Metasploit Cheat Sheet
A bit dated but most is still relevant
OSCP related notes
Nmap Full Web Vulnerable Scan: mkdir /usr/share/nmap/scripts/vulscan cd /usr/share/nmap/scrripts/vulscan wget http://www.computec....
NetCat
Essentials
Exploit-db
OffSec’s Exploit Database Archive
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
SecurityFocus - Vulnerability database
Bugtraq
Vuln Hub - Vulnerable by design
Vulnerable By Design ~ VulnHub
VulnHub provides materials allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
Exploit Exercises
Homepage One - exploit-exercises.com
The self-instruction book is good because it quickly immerses you in the topic. You will start coding almost the day you open the book.
exploit-exercises.com
SecLists - collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads
GitHub - danielmiessler/SecLists: SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patter
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, ...
Security Tube
Metasploit Unleashed - free course on how to use Metasploit
Metasploit Unleashed | Metasploit Unleashed - Free Online Ethical Hacking Course
0Day Security Enumeration Guide http://www.0daysecurity.com/penetration-testing/enumeration.html
Github IO Book - Pen Testing Methodology
Windows Privledge Escalation
Fuzzy Security http://www.fuzzysecurity.com/tutorials/16.html
accesschk.exe https://technet.microsoft.com/en-us/sysinternals/bb664922
Windows Priv Escalation For Pen Testers https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
Elevating Privileges to Admin and Further https://hackmag.com/security/elevating-privileges-to-administrative-and-further/
Transfer files to windows machines https://blog.netspi.com/15-ways-to-download-a-file/
Windows-Privesc/windows privesc sectalks BNE0x19.pdf https://github.com/codingo/Windows-Privesc/blob/master/windows privesc sectalks BNE0x19.pdf