Top Related Projects
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A collection of awesome penetration testing resources, tools and other shiny things
A collection of hacking / penetration testing resources to make you better!
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Quick Overview
The "awesome-oscp" repository is a curated list of resources for the Offensive Security Certified Professional (OSCP) certification. It provides a comprehensive collection of tools, tutorials, and guides to help individuals prepare for the OSCP exam and enhance their penetration testing skills.
Pros
- Extensive collection of high-quality resources for OSCP preparation
- Well-organized and categorized content for easy navigation
- Regularly updated with new and relevant materials
- Community-driven project with contributions from experienced professionals
Cons
- May be overwhelming for beginners due to the vast amount of information
- Some links may become outdated over time
- Lacks a structured learning path or curriculum
- Does not provide direct exam preparation materials from Offensive Security
Note: As this is not a code library, the code example and quick start sections have been omitted.
Competitor Comparisons
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Pros of Privilege-Escalation
- Focused specifically on privilege escalation techniques
- Includes detailed step-by-step guides for various methods
- Provides scripts and tools for automated privilege escalation
Cons of Privilege-Escalation
- Less comprehensive coverage of general OSCP preparation
- Fewer external resources and links to additional learning materials
- May require more prior knowledge to fully utilize the content
Code Comparison
Privilege-Escalation includes specific scripts for privilege escalation, such as:
echo "User: $(whoami)"
echo "Groups: $(id)"
echo "Sudo privileges: $(sudo -l)"
awesome-oscp focuses more on resource curation and doesn't include direct code examples.
Summary
Privilege-Escalation is a specialized repository focusing on privilege escalation techniques, offering detailed guides and scripts. awesome-oscp provides a broader range of resources for OSCP preparation, including various topics beyond privilege escalation. While Privilege-Escalation offers more in-depth content on its specific focus area, awesome-oscp serves as a more comprehensive resource for overall OSCP exam preparation.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Pros of PayloadsAllTheThings
- More comprehensive coverage of various attack techniques and payloads
- Regularly updated with new content and contributions from the community
- Includes practical examples and code snippets for immediate use
Cons of PayloadsAllTheThings
- Less focused on OSCP-specific content
- May be overwhelming for beginners due to the vast amount of information
- Lacks curated study paths or structured learning resources
Code Comparison
PayloadsAllTheThings (SQL Injection example):
' OR '1'='1
' OR 1 -- -
' OR '1'='1'#
awesome-oscp (No direct code examples, but provides links to resources)
Summary
PayloadsAllTheThings offers a broader range of security-related content and is frequently updated, making it valuable for various penetration testing scenarios. However, awesome-oscp is more tailored to OSCP preparation, providing a curated list of resources specifically aligned with the certification's requirements. While PayloadsAllTheThings includes practical code examples, awesome-oscp focuses on linking to external resources and study materials. The choice between the two depends on whether you're specifically preparing for OSCP or seeking a more general security knowledge base.
A collection of awesome penetration testing resources, tools and other shiny things
Pros of awesome-pentest
- Broader scope covering various aspects of penetration testing, not limited to OSCP
- More extensive list of tools and resources for different penetration testing phases
- Regularly updated with contributions from the community
Cons of awesome-pentest
- Less focused on OSCP-specific preparation
- May be overwhelming for beginners due to the vast amount of information
- Some listed tools may not be directly applicable to OSCP exam scenarios
Code comparison
While both repositories primarily consist of curated lists rather than code, here's a comparison of their structure:
awesome-pentest:
## Table of Contents
- [Online Resources](#online-resources)
- [Tools](#tools)
- [Penetration Testing Distributions](#penetration-testing-distributions)
- [Basic Penetration Testing Tools](#basic-penetration-testing-tools)
awesome-oscp:
## Table of Contents
- [OSCP Cheatsheets and Scripts](#oscp-cheatsheets-and-scripts)
- [OSCP Reports](#oscp-reports)
- [OSCP Preparation](#oscp-preparation)
The awesome-pentest repository has a more detailed and extensive structure, while awesome-oscp is more focused on OSCP-specific resources and preparation materials.
A collection of hacking / penetration testing resources to make you better!
Pros of Awesome-Hacking-Resources
- Broader scope covering various aspects of hacking and cybersecurity
- More extensive list of resources, including tools, tutorials, and courses
- Regularly updated with new content and contributions
Cons of Awesome-Hacking-Resources
- Less focused on OSCP certification specifically
- May be overwhelming for beginners due to the large volume of information
- Some resources may not be directly applicable to OSCP preparation
Code Comparison
While both repositories are primarily curated lists of resources, they don't contain significant code. However, here's a comparison of their README structures:
Awesome-Hacking-Resources:
# Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
## Table of Contents
- [Learning the Skills](#learning-the-skills)
- [Tools](#tools)
- [Vulnerable Machines](#vulnerable-machines)
awesome-oscp:
# Awesome OSCP
A curated list of awesome OSCP resources
## Contents
- [OSCP Reviews and Experiences](#oscp-reviews-and-experiences)
- [OSCP Preparation](#oscp-preparation)
- [Cheatsheets and Scripts](#cheatsheets-and-scripts)
Both repositories use similar Markdown structures, but Awesome-Hacking-Resources has a broader scope, while awesome-oscp focuses specifically on OSCP-related content.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
Pros of h4cker
- Broader scope covering various aspects of cybersecurity, not limited to OSCP
- More active repository with frequent updates and contributions
- Includes hands-on labs and practical exercises for skill development
Cons of h4cker
- Less focused on OSCP-specific content compared to awesome-oscp
- May be overwhelming for beginners due to the vast amount of information
- Lacks some specialized OSCP preparation resources found in awesome-oscp
Code Comparison
While both repositories primarily focus on curating resources rather than providing extensive code samples, h4cker does include some code snippets and examples. Here's a brief comparison:
awesome-oscp:
No specific code samples provided
h4cker:
# Example of a simple port scanner
import socket
for port in range(1, 1025):
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
result = sock.connect_ex(('127.0.0.1', port))
if result == 0:
print(f"Port {port} is open")
sock.close()
This code snippet from h4cker demonstrates a basic port scanning technique, which is relevant to both general cybersecurity and OSCP preparation.
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Pros of Cheatsheet-God
- More comprehensive coverage of various cybersecurity topics and tools
- Includes cheatsheets for specific tools and techniques
- Regularly updated with new content and contributions
Cons of Cheatsheet-God
- Less focused on OSCP-specific content
- May be overwhelming for beginners due to the sheer amount of information
- Organization could be improved for easier navigation
Code Comparison
While both repositories primarily consist of markdown files and don't contain much actual code, here's a comparison of their directory structures:
Cheatsheet-God:
.
├── CONTRIBUTING.md
├── LICENSE
├── README.md
└── Cheatsheet_God.md
awesome-oscp:
.
├── CONTRIBUTING.md
├── LICENSE
├── README.md
└── contributing.md
Both repositories have similar basic structures, but Cheatsheet-God consolidates most of its content into a single large markdown file, while awesome-oscp organizes information directly in the README.md file.
Cheatsheet-God offers a more extensive collection of resources covering a broader range of cybersecurity topics, making it suitable for general security learning. However, awesome-oscp is more focused on OSCP-specific content, which may be more beneficial for those specifically preparing for the OSCP certification. Both repositories serve as valuable resources for cybersecurity professionals and enthusiasts, with their own strengths and target audiences.
Convert designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual CopilotREADME
Awesome OSCP
A curated list of awesome OSCP resources
Contents
Resources
OSCP Reviews and Guides
- Official OSCP Certification Exam Guide
- Lukeâs Ultimate OSCP Guide (Part 1, Part 2, Part 3)
- How to prepare for PWK/OSCP, a noob-friendly guide
- n3ko1's OSCP Guide
- Jan's "Path to OSCP" Videos
- Offensive Securityâs PWB and OSCP - My Experience (+ some scripts)
- OSCP Lab and Exam Review
- OSCP Preparation Notes
- A Detailed Guide on OSCP Preparation â From Newbie to OSCP
- My Fight for OSCP
- The Ultimate OSCP Preparation Guide
- The Journey to Try Harder: TJnullâs Preparation Guide for PEN-200 PWK/OSCP 2.0
Cheatsheets and Scripts
- Luke's Practical hacking tips and tricks
- Penetration Testing Tools Cheat Sheet
- How to Pass OSCP
- Reverse Shell Cheat Sheet
- Reverse Shell Generator
- 7 Linux Shells Using Built-in Tools
- Windows Exploit Suggester
- Linux Exploit Suggester
- OSCPRepo
- Go-for-OSCP
- Pentest Compilation
- Collection of OSCP scripts
Topics
Buffer Overflow
- Corelan's Exploit writing tutorial part 1 : Stack Based Overflows
- Justin's DoStackBufferOverflowGood
- Writing Exploits for Win32 Systems from Scratch
- 32-Bit Windows Buffer Overflows Made Easy
- Introduction to Buffer Overflow Video
- OverTheWire's Narnia Wargame
Privilege Escalation
- Windows Privilege Escalation Fundamentals
- Common Windows Privilege Escalation Vectors
- Encyclopaedia Of Windows Privilege Escalation by Brett Moore
- Level Up! Practical Windows Privilege Escalation by Andrew Smith
- Basic Linux Privilege Escalation
- Linux privilege escalation by Jake Williams
Active-Directory
- Active Directory Methodology
- Active Directory Exploitation Cheat Sheet
- PayloadsAllTheThings AD
- Attacking Active Directory: 0 to 0.9
- PowerView-3.0 tips and tricks
Hands-On Resources.
- TryHackMe
- Active Directory Basics - Easy
- Post-Exploitation Basics - Easy
- Vulnnet Roasted - Easy
- Attacktive Directory - Medium
- raz0r black - Medium
- Enterprise - Medium
- Vulnnet Active - Medium
- Zero Logon - Hard
- Holo - Hard
- Throwback - Easy
- HackTheBox
- HackTheBox Academy ( PAID )
- Introduction to Active Directory - Fundamental
- ActiveDirectory LDAP - Medium
- ActiveDirectory Powerview - Medium
- ActiveDirectory BloodHound - Medium
- ActiveDirectory Enumeration & Attacks - Medium
- Proving Grounds
- PG-Practice ( PAID )
- Hutch
- Heist
- Vault
- PG-Practice ( PAID )
Other OSCP Resources
- PWK Syllabus
- OSCP-Prep-Resources
- Offensive Security Bookmarks
- The how to get the OSCP certification wiki
- OSCP Goldmine
- Penetration Testing Study Notes
- OSCP-like Vulnhub VMs
- Metasploit Unleashed
- Awesome Penetration Testing
- OSCP Exam Report Template in Markdown
Books
- Penetration Testing: A Hands-on Introduction to Hacking
- The Hacker Playbook 3: Practical Guide to Penetration Testing
- RTFM: Red Team Field Manual
- RTFM: Red Team Field Manual v2
- The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws (2nd Edition)
License
To the extent possible under law, Adel "0x4D31" Karimi has waived all copyright and related or neighboring rights to this work.
Top Related Projects
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A collection of awesome penetration testing resources, tools and other shiny things
A collection of hacking / penetration testing resources to make you better!
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Convert designs to code with AI
Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.
Try Visual Copilot