OSCP Resources
Backdoors/Web Shells
http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
https://highon.coffee/blog/reverse-shell-cheat-sheet/
http://pentestmonkey.net/tools/web-shells/php-reverse-shell
http://pentestmonkey.net/tools/web-shells/perl-reverse-shell
https://github.com/bartblaze/PHP-backdoors
https://github.com/BlackArch/webshells
https://github.com/tennc/webshell/tree/master/php/b374k
https://github.com/tennc/webshell/tree/master/php/PHPshell/c99shell
http://www.acunetix.com/blog/articles/web-shells-101-using-php-introduction-web-shells-part-2/
http://securityweekly.com/2011/10/23/python-one-line-shell-code/
Buffer Overflows
http://www.primalsecurity.net/0x0-exploit-tutorial-buffer-overflow-vanilla-eip-overwrite-2/
http://proactivedefender.blogspot.ca/2013/05/understanding-buffer-overflows.html
http://justpentest.blogspot.ca/2015/07/minishare1.4.1-bufferoverflow.html
https://samsclass.info/127/proj/vuln-server.htm
http://www.bulbsecurity.com/finding-bad-characters-with-immunity-debugger-and-mona-py/
Information Gathering/Reconnaissance
LeeBaird Discover Script
https://github.com/leebaird/discover
The Basics Of Penetration Testing
https://www.hackcave.net/2015/11/the-basics-of-penetration-testing.html
Penetration Testing Framework
http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html
Cross-Compilation
https://arrayfire.com/cross-compile-to-windows-from-linux/
Local File Inclusion/Remote File Inclusion (LFI/RFI)
http://www.grobinson.me/single-line-php-script-to-gain-shell/
https://webshell.co/
https://www.insomniasec.com/downloads/publications/LFI%20With%20PHPInfo%20Assistance.pdf
https://osandamalith.com/2015/03/29/lfi-freak/
https://wiki.apache.org/httpd/DistrosDefaultLayout#Debian.2C_Ubuntu_.28Apache_httpd_2.x.29
https://roguecod3r.wordpress.com/2014/03/17/lfi-to-shell-exploiting-apache-access-log/
https://attackerkb.com/Windows/blind_files
https://digi.ninja/blog/when_all_you_can_do_is_read.php
https://updatedlinux.wordpress.com/2011/05/12/list-of-important-files-and-directories-in-linux-redhatcentosfedora/
https://www.idontplaydarts.com/2011/02/using-php-filter-for-local-file-inclusion/
https://github.com/tennc/fuzzdb/blob/master/dict/BURP-PayLoad/LFI/LFI_InterestingFiles-NullByteAdded.txt
http://www.r00tsec.com/2014/04/useful-list-file-for-local-file.html
https://www.gracefulsecurity.com/path-traversal-cheat-sheet-windows/
https://github.com/tennc/fuzzdb/blob/master/dict/BURP-PayLoad/LFI/LFI-FD-check.txt
File Transfer
https://insekurity.wordpress.com/2012/05/15/file-transfer/
https://www.cheatography.com/fred/cheat-sheets/file-transfers/
https://blog.ropnop.com/transferring-files-from-kali-to-windows/
https://linux.die.net/man/1/scp
https://www.freebsd.org/cgi/man.cgi?fetch(1)
https://curl.haxx.se/docs/manpage.html
https://linux.die.net/man/1/wget
**SCP, WGET, FTP, TFTP, CURL, NC, FETCH Fuzzing Payloads
https://github.com/fuzzdb-project/fuzzdb
https://github.com/danielmiessler/SecLists
General Notes
https://bitvijays.github.io/LFC-VulnerableMachines.html
http://blog.knapsy.com/blog/2014/10/07/basic-shellshock-exploitation/
http://www.studfiles.ru/preview/2083097/page:7/
http://126kr.com/article/3vbt0k8fxwh
http://meyerweb.com/eric/tools/dencoder/
https://www.darkoperator.com/powershellbasics
https://wooly6bear.files.wordpress.com/2016/01/bwapp-tutorial.pdf
http://alexflor.es/security-blog/post/egress-ports/
https://www.exploit-db.com/papers/13017/
https://www.owasp.org/index.php/OWASP_Broken_Web_Applications_Project
http://explainshell.com/
https://pentestlab.blog/2012/11/29/bypassing-file-upload-restrictions/
https://github.com/g0tmi1k/mpc
https://www.reddit.com/r/netsecstudents/comments/5fwc1z/failed_the_oscp_any_tips_for_the_next_attempt/danovo5/
https://security.stackexchange.com/questions/110673/how-to-find-windows-version-from-the-file-on-a-remote-system
https://www.veil-framework.com/veil-tutorial/ (AV Evasion)
https://blog.propriacausa.de/wp-content/uploads/2016/07/oscp_notes.html
https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/
gnore SSL in python scripts : http://stackoverflow.com/questions/19268548/python-ignore-certicate-validation-urllib2
Jailed Shell Escape
http://netsec.ws/?p=337
https://pen-testing.sans.org/blog/2012/06/06/escaping-restricted-linux-shells
https://speakerdeck.com/knaps/escape-from-shellcatraz-breaking-out-of-restricted-unix-shells
http://airnesstheman.blogspot.ca/2011/05/breaking-out-of-jail-restricted-shell.html
http://securebean.blogspot.ca/2014/05/escaping-restricted-shell_3.html
Linux Post-Exploitation
https://github.com/mubix/post-exploitation/wiki/Linux-Post-Exploitation-Command-List
https://github.com/huntergregal/mimipenguin
https://github.com/mubix/post-exploitation/wiki/Linux-Post-Exploitation-Command-List
Linux Privilege Escalation
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
https://www.kernel-exploits.com/
https://github.com/rebootuser/LinEnum
https://github.com/PenturaLabs/Linux_Exploit_Suggester
https://www.securitysift.com/download/linuxprivchecker.py
http://pentestmonkey.net/tools/audit/unix-privesc-check
https://github.com/mzet-/linux-exploit-suggester
http://www.darknet.org.uk/2015/06/unix-privesc-check-unixlinux-user-privilege-escalation-scanner/
https://www.youtube.com/watch?v=dk2wsyFiosg
http://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/#gref
https://www.rebootuser.com/?p=1758
Metasploit
https://www.offensive-security.com/metasploit-unleashed/
http://www.securitytube.net/groups?operation=view&groupId=8
MSFVenom Payloads
http://netsec.ws/?p=331
https://www.offensive-security.com/metasploit-unleashed/msfvenom/
http://www.blackhillsinfosec.com/?p=4935
Port Scanning
https://highon.coffee/blog/nmap-cheat-sheet/
https://nmap.org/nsedoc/
https://github.com/superkojiman/onetwopunch
http://kalilinuxtutorials.com/unicornscan/
Password Cracking
https://uwnthesis.wordpress.com/2013/08/07/kali-how-to-crack-passwords-using-hashcat/
https://hashkiller.co.uk/
https://linuxconfig.org/password-cracking-with-john-the-ripper-on-linux
http://www.rarpasswordcracker.com/
Pivoting
https://www.offensive-security.com/metasploit-unleashed/portfwd/
https://www.offensive-security.com/metasploit-unleashed/proxytunnels/
https://github.com/rofl0r/proxychains-ng
https://www.sans.org/reading-room/whitepapers/testing/tunneling-pivoting-web-application-penetration-testing-36117
https://pentest.blog/explore-hidden-networks-with-double-pivoting/
https://blog.techorganic.com/2012/10/10/introduction-to-pivoting-part-2-proxychains/
https://www.cobaltstrike.com/help-socks-proxy-pivoting
https://sathisharthars.com/2014/07/07/evade-windows-firewall-by-ssh-tunneling-using-metasploit/
https://artkond.com/2017/03/23/pivoting-guide/
Remote Desktop Protocol (RDP)
https://serverfault.com/questions/148731/enabling-remote-desktop-with-command-prompt
https://serverfault.com/questions/200417/ideal-settings-for-rdesktop
Samba (SMB)
https://pen-testing.sans.org/blog/2013/07/24/plundering-windows-account-info-via-authenticated-smb-sessions
http://www.blackhillsinfosec.com/?p=4645
TTY Shell Spawning
http://netsec.ws/?p=337
https://github.com/infodox/python-pty-shells
https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/
SQL Injection
http://www.sqlinjection.net/category/attacks/
http://sechow.com/bricks/docs/login-1.html
https://www.exploit-db.com/papers/12975/
https://websec.wordpress.com/2010/12/04/sqli-filter-evasion-cheat-sheet-mysql/
https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/
https://github.com/cr0hn/nosqlinjection_wordlists
https://blog.scrt.ch/2013/03/24/mongodb-0-day-ssji-to-rce/
https://websec.ca/kb/sql_injection#MSSQL_Default_Databases
Vulnhub VMs
Kioptrix: Level 1 (#1)
Kioptrix: Level 1.1 (#2)
Kioptrix: Level 1.2 (#3)
Kioptrix: Level 1.3 (#4)
FristiLeaks: 1.3
Stapler: 1
PwnLab: init
Tr0ll: 1
Tr0ll: 2
Kioptrix: 2014
Lord Of The Root: 1.0.1
Stapler: 1
Mr-Robot: 1
HackLAB: Vulnix
VulnOS: 2
SickOs: 1.2
pWnOS: 2.0
HackTheBox (HTB) and TryHackMe (THM)
HTB is a penetration testing platform with many machines that feel like they belong in the OSCP labs. All you have to do is pass the registration challenge and only then, you will have your VPN access provided. I suggest doing a few as it is free and an excellent way to prepare for the exam without downloading a vulnerable VM.
Web Exploitation
http://www.studfiles.ru/preview/2083097/page:7/
http://126kr.com/article/3vbt0k8fxwh
http://meyerweb.com/eric/tools/dencoder/
Windows Post-Exploitation
https://github.com/gentilkiwi/mimikatz/releases/
https://github.com/gentilkiwi/mimikatz/wiki/module-~-sekurlsa
http://www.handgrep.se/repository/cheatsheets/postexploitation/WindowsPost-Exploitation.pdf
https://github.com/PowerShellMafia/PowerSploit
https://github.com/gentilkiwi/mimikatz/releases
http://www.handgrep.se/repository/cheatsheets/postexploitation/WindowsPost-Exploitation.pdf
https://github.com/mubix/post-exploitation/wiki/windows
Windows Privilege Escalation
http://www.fuzzysecurity.com/tutorials/16.html
https://toshellandback.com/2015/11/24/ms-priv-esc/
https://github.com/pentestmonkey/windows-privesc-check
https://blog.gdssecurity.com/labs/2014/7/11/introducing-windows-exploit-suggester.html
https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
https://github.com/foxglovesec/RottenPotato
http://www.exumbraops.com/penetration-testing-102-windows-privilege-escalation-cheatsheet/
https://www.youtube.com/watch?v=PC_iMqiuIRQ
https://www.youtube.com/watch?v=kMG8IsCohHA&feature=youtu.be
https://github.com/PowerShellMafia/PowerSploit
http://www.blackhillsinfosec.com/?p=5824
https://www.commonexploits.com/unquoted-service-paths/
https://github.com/abatchy17/WindowsExploits
Last updated