🌇
oscp
search
⌘Ctrlk
🌇
oscp
  • Introduction
  • Chapter 1 - Cheatsheets
  • Chapter 2 - Recon & Enumeration
  • Chapter 3 - Exploiting Vulnerabilities
  • Chapter 4 - Windows Post-Exploitation
  • Chapter 5 - Linux Post-Exploitation
  • Chapter 6 - Exploit Development
  • Chapter 7 - Cracking
  • Chapter 8 - Reverse Engineering
  • Chapter 9 - Miscellaneous
Powered by GitBook
block-quoteOn this pagechevron-down

Introduction

Central repo for myself and others for oscp notes. You are welcome to PR.

Still a work in progress, expect updates...maybe.

hashtag
Table of Contents

​Chapter 1 - Cheatsheets

​Chapter 2 - Recon & Enumeration

​Chapter 3 - Exploiting Vulnerabilities

Chapter 4 - Windows Post-Exploitation

​Chapter 5 - Linux Post-Exploitation​

Chapter 6 - Exploit Development

Chapter 7 - Cracking​

Chapter 8 - Reverse Engineering

​Chapter 9 - Miscellaneous

NextChapter 1 - Cheatsheetschevron-right

Last updated 5 years ago