OSCP-BoF
try-harder
Our great sponsors
OSCP-BoF | try-harder | |
---|---|---|
2 | 2 | |
64 | 151 | |
- | - | |
0.0 | 5.2 | |
almost 3 years ago | 8 months ago | |
Python | Python | |
GNU General Public License v3.0 only | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
OSCP-BoF
-
For whatever reason, I am having a lot of trouble grasping buffer overflows. What is your favorite resource/video that spelled it out for you when you learned?
And then once you get the concepts, https://github.com/3isenHeiM/OSCP-BoF for the practical methodology (I'm the author).
- 1st attempt, 80+ points. My experience and some unpopular opinions inside.
try-harder
- I create cybersecurity retro games as a hobby. "Try Harder" is designed to simulate 100 scenarios that will help you prepare for the Offensive Security Certified Professional (OSCP) exam, all while offering an immersive experience and retro aesthetic. Check out my Github and Play it now!
- I create Cybersecurity themed Retro RPGs as a hobby. "Mainframers" is a Sneakers-Inspired Cybersecurity RPG is an educational text-based role-playing game (RPG) that aims to teach players about IBM mainframe penetration testing and cybersecurity.
What are some alternatives?
dostackbufferoverflowgood
hack_hard - A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard
SUID3NUM - A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
Pokemanki - Catch and train Pokémon as you learn with Anki
zenith - Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
gh0stbust3rz - Build a C2 system while becoming a techie Gh0stbust3r! Learn real-world RedTeam skills and even earn a basic c2 by completing the game
raptor_infiltrate20 - #INFILTRATE20 raptor's party pack.
gamefinder - Gamefinder automates monitoring the Ebay API for gaming related items, providing visual and audible notifications of new items and gives you a significant advantage over manually monitoring the website for new gaming items.
TireFire - Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortable GUI-ish platform. Great for OSCP/HTB type Machines as well as penetration testing.
SUDO_KILLER - A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
Interlace - Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Win7Blue - Scan/Exploit - EternalBlue MS17-010 - Windows 7 32/64 Bits