EZEA
RELY
Our great sponsors
EZEA | RELY | |
---|---|---|
10 | 1 | |
91 | 2 | |
- | - | |
1.8 | 0.0 | |
almost 3 years ago | almost 3 years ago | |
Shell | Python | |
GNU General Public License v3.0 only | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
EZEA
- I passed OSCP, and here is how you should(nt) do it
-
5/5 full compromise. Rick Rolled the proctor. 😂
Congrats bro, I personally like notion. And use tilix for terminal segmention. Made a bash script for enumeration: https://github.com/yassirlaaouissi/EZEA
-
Exam in 1 week, any last tips
I have my exam on thr 6th of june, 09:00, amsterdam time. I have the entire public PWK network done, 25 hackthebox machines from TJ Nulls list, 10 BOF machines, an automated enum tool (https://github.com/yassirlaaouissi/EZEA), all of my notes and a healthy amount of failure anxiety for the OSCP Exam. Did most of the boxes without hints, the 5 big ones and some hackthebox machines mostly needed hints on initial foothold for me.
-
Exam in <24 hours - Planning to fail. What do I do, study, or at least research?
I made a nice enum tool, use it: https://github.com/yassirlaaouissi/EZEA
-
Mid OSCP Update #2
The first two weeks of my labtime went to the course material (PDF and video). After that I spent a week or two on making an enumeration tool: https://github.com/yassirlaaouissi/EZEA
-
Tips and resources on pentesting methodology?
Many people make tools based on steps in the methodology. I've made a tool to auromate the enumeration step: https://github.com/yassirlaaouissi/EZEA
-
Just Failed First Attempt - BOF, and then NOTHING - HUH?
This is kinda self advertising, but trust me. It will save you time; I use this tool to enumerate my targets. Have done around 30 PWK boxes and 7 HTB machines with it so far: https://github.com/yassirlaaouissi/EZEA
-
Mid OSCP Update
I have been using my enumeration tool EZEA (https://github.com/yassirlaaouissi/EZEA), and so far I am not disappointed I spent time on it. If anyone has suggestions on how to make this tool better, or on how to practice buffer overflows, please do tell me. Have a nice day!
-
Made a nice OSCP enum tool
Made this tool based on several other tools that can simplify the enumeration proces for OSCP-like environments. Have rooted 8 boxes so far using this tool in 2 weeks time. Here is the link, let me know how you feel about it: https://github.com/yassirlaaouissi/EZEA
-
OSCP tips: Enumeration + time management
I've made an automatic enumerator for myself to prevent timeloss typing all commands from scratch during OSCP. Here it is, let me know what you think about it: https://github.com/yassirlaaouissi/EZEA
RELY
-
Made a nice OSCP enum tool
Thanks for the tip, I've already made a small triage tool for windows forensics as part of a school project https://github.com/yassirlaaouissi/RELY
What are some alternatives?
OSCP-Exam-Report-Template - Modified template for the OSCP Exam and Labs. Used during my passing attempt
RecuperaBit - A tool for forensic file system reconstruction.
AutoRecon - AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
kobackupdec - Huawei backup decryptor
SUDO_KILLER - A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
beagle - Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs.
nmapAutomator - A script that you can run in the background!
hindsight - Web browser forensics for Google Chrome/Chromium
Pentest-Service-Enumeration - Suggests programs to run against services found during the enumeration phase of a Pentest
APT-Hunter - APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the sea of windows event logs to decrease the time to uncover suspicious activity
alacarte
TheHiveDocs - Documentation of TheHive