Advertisement
Guest User

OSCP links

a guest
Feb 16th, 2018
5,639
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.75 KB | None | 0 0
  1. OSCP_Helpful_Links.md
  2.  
  3. OSCP Course Review
  4. Offensive Security’s PWB and OSCP — My Experience
  5. http://www.securitysift.com/offsec-pwb-oscp/
  6.  
  7. OSCP Journey
  8. https://scriptkidd1e.wordpress.com/oscp-journey/
  9.  
  10. Down with OSCP
  11. http://ch3rn0byl.com/down-with-oscp-yea-you-know-me/
  12.  
  13. Jolly Frogs - Tech Exams (Very thorough)
  14.  
  15. http://www.techexams.net/forums/security-certifications/110760-oscp-jollyfrogs-tale.html
  16.  
  17. OSCP Inspired VMs and Walkthroughs
  18. https://www.hackthebox.eu/
  19.  
  20. https://www.root-me.org/
  21.  
  22. https://www.vulnhub.com/
  23.  
  24. Walk through of Tr0ll-1 - Inspired by on the Trolling found in the OSCP exam
  25. https://highon.coffee/blog/tr0ll-1-walkthrough/
  26. Another walk through for Tr0ll-1
  27. https://null-byte.wonderhowto.com/how-to/use-nmap-7-discover-vulnerabilities-launch-dos-attacks-and-more-0168788/
  28. Taming the troll - walkthrough
  29. https://leonjza.github.io/blog/2014/08/15/taming-the-troll/
  30. Troll download on Vuln Hub
  31. https://www.vulnhub.com/entry/tr0ll-1,100/
  32.  
  33. Sickos - Walkthrough:
  34. https://highon.coffee/blog/sickos-1-walkthrough/
  35. Sickos - Inspired by Labs in OSCP
  36. https://www.vulnhub.com/series/sickos,70/
  37.  
  38. Lord of the Root Walk Through
  39. https://highon.coffee/blog/lord-of-the-root-walkthrough/
  40. Lord Of The Root: 1.0.1 - Inspired by OSCP
  41. https://www.vulnhub.com/series/lord-of-the-root,67/
  42.  
  43. Tr0ll-2 Walk Through
  44. https://leonjza.github.io/blog/2014/10/10/another-troll-tamed-solving-troll-2/
  45. Tr0ll-2
  46. https://www.vulnhub.com/entry/tr0ll-2,107/
  47.  
  48. Cheat Sheets
  49. Penetration Tools Cheat Sheet
  50. https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/
  51.  
  52. Pen Testing Bookmarks
  53. https://github.com/kurobeats/pentest-bookmarks/blob/master/BookmarksList.md
  54.  
  55. OSCP Cheatsheets
  56. https://github.com/slyth11907/Cheatsheets
  57.  
  58. CEH Cheatsheet
  59. https://scadahacker.com/library/Documents/Cheat_Sheets/Hacking%20-%20CEH%20Cheat%20Sheet%20Exercises.pdf
  60.  
  61. Net Bios Scan Cheat Sheet
  62. https://highon.coffee/blog/nbtscan-cheat-sheet/
  63.  
  64. Reverse Shell Cheat Sheet
  65. https://highon.coffee/blog/reverse-shell-cheat-sheet/
  66.  
  67. NMap Cheat Sheet
  68. https://highon.coffee/blog/nmap-cheat-sheet/
  69.  
  70. Linux Commands Cheat Sheet
  71. https://highon.coffee/blog/linux-commands-cheat-sheet/
  72.  
  73. Security Hardening CentO 7
  74. https://highon.coffee/blog/security-harden-centos-7/
  75.  
  76. MetaSploit Cheatsheet
  77. https://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf
  78.  
  79. Google Hacking Database:
  80. https://www.exploit-db.com/google-hacking-database/
  81.  
  82. Windows Assembly Language Mega Primer
  83. http://www.securitytube.net/groups?operation=view&groupId=6
  84.  
  85. Linux Assembly Language Mega Primer
  86. http://www.securitytube.net/groups?operation=view&groupId=5
  87.  
  88. Metasploit Cheat Sheet
  89. https://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf
  90.  
  91. A bit dated but most is still relevant
  92.  
  93. http://hackingandsecurity.blogspot.com/2016/04/oscp-related-notes.html
  94.  
  95. NetCat
  96.  
  97. http://www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf
  98.  
  99. http://www.secguru.com/files/cheatsheet/nessusNMAPcheatSheet.pdf
  100.  
  101. http://sbdtools.googlecode.com/files/hping3_cheatsheet_v1.0-ENG.pdf
  102.  
  103. http://sbdtools.googlecode.com/files/Nmap5%20cheatsheet%20eng%20v1.pdf
  104.  
  105. http://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf
  106.  
  107. http://rmccurdy.com/scripts/Metasploit%20meterpreter%20cheat%20sheet%20reference.html
  108.  
  109. http://h.ackack.net/cheat-sheets/netcat
  110.  
  111. Essentials
  112. Exploit-db
  113. https://www.exploit-db.com/
  114.  
  115. SecurityFocus - Vulnerability database
  116. http://www.securityfocus.com/
  117.  
  118. Vuln Hub - Vulnerable by design
  119. https://www.vulnhub.com/
  120.  
  121. Exploit Exercises
  122. https://exploit-exercises.com/
  123.  
  124. SecLists - collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads
  125. https://github.com/danielmiessler/SecLists
  126.  
  127. Security Tube
  128. http://www.securitytube.net/
  129.  
  130. Metasploit Unleashed - free course on how to use Metasploit
  131. https://www.offensive-security.com/metasploit-unleashed/
  132.  
  133. 0Day Security Enumeration Guide http://www.0daysecurity.com/penetration-testing/enumeration.html
  134.  
  135. Github IO Book - Pen Testing Methodology
  136. https://monkeysm8.gitbooks.io/pentesting-methodology/
  137.  
  138. Windows Privledge Escalation
  139. Fuzzy Security http://www.fuzzysecurity.com/tutorials/16.html
  140.  
  141. accesschk.exe https://technet.microsoft.com/en-us/sysinternals/bb664922
  142.  
  143. Windows Priv Escalation For Pen Testers https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
  144.  
  145. Elevating Privileges to Admin and Further https://hackmag.com/security/elevating-privileges-to-administrative-and-further/
  146.  
  147. Transfer files to windows machines https://blog.netspi.com/15-ways-to-download-a-file/
  148.  
  149. Windows-Privesc/windows privesc sectalks BNE0x19.pdf https://github.com/codingo/Windows-Privesc/blob/master/windows%20privesc%20sectalks%20BNE0x19.pdf
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement