Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized
Useful scripts, see README.md
files in script directories for individual usage and information.
This project is mirrored to GitHub from the primary repository on GitLab at
https://gitlab.com/datenstrom/sec-utils and if
accessed on GitHub may not be the most recent version.
Legal Disclaimer: usage of tools for attacking web servers without prior mutual consistency can be considered as an illegal activity. it is the final user's responsibility to obey all applicable local, state and federal laws. authors assume no liability and are not responsible for any misuse or damage caused by these tools.
Even information gathering such as port scanning is considered illegal in many areas and a gery area in most.
vulnserver.exe
exercise in OSCPIt is possible to turn FTP into a non-interactive process by providing the Windows
default FTP client ftp.exe
with a text file containing FTP commands. This is
useful in post exploitation when there is a need to upload files and tools to a
machine.
All program output files are by convention use the .txt
extension which are ignored by the
.gitignore
. All files for input are by convention .dat
which will be tracked.