Herramientas de usuario

Herramientas del sitio


enlaces:seguridad:certificaciones:oscp

Diferencias

Muestra las diferencias entre dos versiones de la página.

Enlace a la vista de comparación

Ambos lados, revisión anteriorRevisión previa
Próxima revisión
Revisión previa
Próxima revisiónAmbos lados, revisión siguiente
enlaces:seguridad:certificaciones:oscp [2018/11/26 15:19] cayuenlaces:seguridad:certificaciones:oscp [2018/12/26 18:52] cayu
Línea 102: Línea 102:
  
 ettercap ettercap
 +<code>
 +ettercap -T -q -i eth0 -P dns_spoof -M arp /10.168.40.145/// 
 +</code>
  
- ettercap -T -q -i eth0 -P dns_spoof -M arp /10.168.40.145///  +tcpdump -n -i wlan0 -e 'arp or icmp'
- +
- +
-└──╼ #tcpdump -n -i wlan0 -e 'arp or icmp'+
  
  
Línea 350: Línea 350:
  
 Good reviews of CTP/OSCE (in no particular order): Good reviews of CTP/OSCE (in no particular order):
 +
 Note: * mark means look for other posts on this blog Note: * mark means look for other posts on this blog
-https://www.jollyfrogs.com + 
-*http://www.securitysift.com/offsec-ctp-osce/ +  * https://www.jollyfrogs.com 
-*http://buffered.io/posts/osce-and-me/ +  * http://www.securitysift.com/offsec-ctp-osce/ 
-http://www.iodigitalsec.com/offensive-security-ctp-course-and-osce-certification-review/ +  * http://buffered.io/posts/osce-and-me/ 
-*http://ethicalhacker.io/post/137403906740/osce-exam-prep +  http://www.iodigitalsec.com/offensive-security-ctp-course-and-osce-certification-review/ 
-https://blog.g0tmi1k.com/2013/08/cracking-perimeter-ctp-offensive/ +  * http://ethicalhacker.io/post/137403906740/osce-exam-prep 
-*https://infamoussyn.com/resources/ +  https://blog.g0tmi1k.com/2013/08/cracking-perimeter-ctp-offensive/ 
-http://www.vividmachines.com/shellcode/shellcode.html +  * https://infamoussyn.com/resources/ 
-http://www.primalsecurity.net/course-review-osce/ +  http://www.vividmachines.com/shellcode/shellcode.html 
-*http://netsec.ws/?p=517 +  http://www.primalsecurity.net/course-review-osce/ 
-http://tekwizz123.blogspot.sg/2014/09/osce-review-and-experience.html +  * http://netsec.ws/?p=517 
-https://networkfilter.blogspot.sg/2016/01/my-osce-review.html +  http://tekwizz123.blogspot.sg/2014/09/osce-review-and-experience.html 
-https://www.blogtecnico.net/certificacion-osce-review-cracking-the-perimeter-ctp/ +  https://networkfilter.blogspot.sg/2016/01/my-osce-review.html 
-******* https://github.com/reider-roque +  https://www.blogtecnico.net/certificacion-osce-review-cracking-the-perimeter-ctp/ 
-http://shell-storm.org/shellcode/+  * https://github.com/reider-roque 
 +  http://shell-storm.org/shellcode/
    
 Tutorial sites (more stars = better/recommended): Tutorial sites (more stars = better/recommended):
-https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/ +  * https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/ 
-http://www.0daysecurity.com/pentest.html +  http://www.0daysecurity.com/pentest.html 
-http://ly0n.me/2015/10/19/lfi-beyond-procselfenviron/ +  http://ly0n.me/2015/10/19/lfi-beyond-procselfenviron/ 
-********************http://phrack.org/issues/62/7.html +  * http://phrack.org/issues/62/7.html 
-***************************http://0xdabbad00.com/2012/12/09/hurdles-for-a-beginner-to-exploit-a-simple-vulnerability-on-modern-windows/ +  * http://0xdabbad00.com/2012/12/09/hurdles-for-a-beginner-to-exploit-a-simple-vulnerability-on-modern-windows/ 
-**********************https://community.rapid7.com/community/metasploit/blog/2012/07/05/part-1-metasploit-module-development--the-series +  * https://community.rapid7.com/community/metasploit/blog/2012/07/05/part-1-metasploit-module-development--the-series 
-***** http://resources.infosecinstitute.com/intro-to-fuzzing/ +  * http://resources.infosecinstitute.com/intro-to-fuzzing/ 
-******* https://madmantm.wordpress.com/ +  * https://madmantm.wordpress.com/ 
-https://www.fuzzysecurity.com/tutorials.html +  https://www.fuzzysecurity.com/tutorials.html 
-https://www.corelan.be/index.php/2010/03/27/exploiting-ken-ward-zipper-taking-advantage-of-payload-conversion/ +  https://www.corelan.be/index.php/2010/03/27/exploiting-ken-ward-zipper-taking-advantage-of-payload-conversion/ 
-http://netsec.ws/?p=180 +  http://netsec.ws/?p=180 
-http://netsec.ws/?p=430 +  http://netsec.ws/?p=430 
-http://netsec.ws/?cat=57 +  http://netsec.ws/?cat=57 
-************************http://blog.stalkr.net/2011/04/pctf-2011-22-hashcalc1.html +  * http://blog.stalkr.net/2011/04/pctf-2011-22-hashcalc1.html 
-https://ionize.com.au/its-all-about-inclusion/ +  https://ionize.com.au/its-all-about-inclusion/ 
-https://www.idontplaydarts.com/2012/06/encoding-web-shells-in-png-idat-chunks/ +  https://www.idontplaydarts.com/2012/06/encoding-web-shells-in-png-idat-chunks/ 
-https://www.idontplaydarts.com/2011/03/php-remote-file-inclusion-command-shell-using-data-stream/ +  https://www.idontplaydarts.com/2011/03/php-remote-file-inclusion-command-shell-using-data-stream/ 
-https://www.idontplaydarts.com/2011/02/using-php-filter-for-local-file-inclusion/ +  https://www.idontplaydarts.com/2011/02/using-php-filter-for-local-file-inclusion/ 
-https://websec.wordpress.com/2010/02/22/exploiting-php-file-inclusion-overview/ +  https://websec.wordpress.com/2010/02/22/exploiting-php-file-inclusion-overview/ 
-https://sites.google.com/site/xssvulnerabilities/bypassing-browser-anti-xss-filters +  https://sites.google.com/site/xssvulnerabilities/bypassing-browser-anti-xss-filters 
-http://carnal0wnage.attackresearch.com/ +  http://carnal0wnage.attackresearch.com/ 
-**https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/ +  * https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/ 
-https://www.kernel-exploits.com/ +  https://www.kernel-exploits.com/ 
-http://www.thegreycorner.com/2010/01/seh-stack-based-windows-buffer-overflow.html +  http://www.thegreycorner.com/2010/01/seh-stack-based-windows-buffer-overflow.html 
-http://www.thegreycorner.com/2010/02/windows-buffer-overflow-tutorial.html +  http://www.thegreycorner.com/2010/02/windows-buffer-overflow-tutorial.html 
-http://www.thegreycorner.com/2010/01/beginning-stack-based-buffer-overflow.html +  http://www.thegreycorner.com/2010/01/beginning-stack-based-buffer-overflow.html 
-https://www.corelan.be/index.php/2011/07/03/universal-depaslr-bypass-with-msvcr71-dll-and-mona-py/ +  https://www.corelan.be/index.php/2011/07/03/universal-depaslr-bypass-with-msvcr71-dll-and-mona-py/ 
-https://www.corelan.be/index.php/2010/03/27/exploiting-ken-ward-zipper-taking-advantage-of-payload-conversion/ +  https://www.corelan.be/index.php/2010/03/27/exploiting-ken-ward-zipper-taking-advantage-of-payload-conversion/ 
-https://www.corelan.be/index.php/2010/03/27/quickzip-stack-bof-0day-a-box-of-chocolates/ +  https://www.corelan.be/index.php/2010/03/27/quickzip-stack-bof-0day-a-box-of-chocolates/ 
-https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/ +  https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/ 
-https://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/ +  https://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/ 
-https://www.corelan.be/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/ +  https://www.corelan.be/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/ 
-https://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/ +  https://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/ 
-https://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/ +  https://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/ 
-https://www.corelan.be/index.php/2009/09/05/exploit-writing-tutorial-part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/ +  https://www.corelan.be/index.php/2009/09/05/exploit-writing-tutorial-part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/ 
-https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/ +  https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/ 
-https://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/ +  https://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/ 
-https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/ +  https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/ 
-https://www.corelan.be/index.php/2010/01/26/starting-to-write-immunity-debugger-pycommands-my-cheatsheet/ +  https://www.corelan.be/index.php/2010/01/26/starting-to-write-immunity-debugger-pycommands-my-cheatsheet/ 
-https://www.corelan.be/index.php/2010/02/25/exploit-writing-tutorial-part-9-introduction-to-win32-shellcoding/ +  https://www.corelan.be/index.php/2010/02/25/exploit-writing-tutorial-part-9-introduction-to-win32-shellcoding/ 
-https://websec.wordpress.com/2010/02/22/exploiting-php-file-inclusion-overview/ +  https://websec.wordpress.com/2010/02/22/exploiting-php-file-inclusion-overview/ 
-https://sites.google.com/site/xssvulnerabilities/bypassing-browser-anti-xss-filters +  https://sites.google.com/site/xssvulnerabilities/bypassing-browser-anti-xss-filters 
-***** https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/ +  * https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/ 
-https://github.com/sploitfun/lsploits +  https://github.com/sploitfun/lsploits 
-http://blog.pusheax.com/2013/03/exploit-writing-stack-based-buffer.html +  http://blog.pusheax.com/2013/03/exploit-writing-stack-based-buffer.html 
-http://www.keystone-engine.org/docs/tutorial.html +  http://www.keystone-engine.org/docs/tutorial.html 
-http://resources.infosecinstitute.com/analysis-of-malware-samples/ +  http://resources.infosecinstitute.com/analysis-of-malware-samples/ 
-http://www.fuzzysecurity.com/tutorials/7.html +  http://www.fuzzysecurity.com/tutorials/7.html 
-***** https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2016/june/writing-exploits-for-win32-systems-from-scratch/ +  * https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2016/june/writing-exploits-for-win32-systems-from-scratch/ 
-** http://phrack.org/issues/67/13.html +  * http://phrack.org/issues/67/13.html 
-http://www.securepla.net/ +  http://www.securepla.net/ 
-***** http://programming4.us/security/688.aspx +  * http://programming4.us/security/688.aspx 
-http://resources.infosecinstitute.com/buffer-overflow-vulnserver/ +  http://resources.infosecinstitute.com/buffer-overflow-vulnserver/ 
-***** http://www.primalsecurity.net/0x8-exploit-tutorial-the-elusive-egghunter/ +  * http://www.primalsecurity.net/0x8-exploit-tutorial-the-elusive-egghunter/ 
-********** https://blog.techorganic.com/2014/05/14/from-fuzzing-to-0-day/ +  * https://blog.techorganic.com/2014/05/14/from-fuzzing-to-0-day/ 
-*********************** http://www.flinkd.org/2011/07/fuzzing-with-peach-part-1/ +  * http://www.flinkd.org/2011/07/fuzzing-with-peach-part-1/ 
-************ http://realpentesting.blogspot.sg/2013/04/0day-bug-hunting-realpentesting.html +  * http://realpentesting.blogspot.sg/2013/04/0day-bug-hunting-realpentesting.html 
-******** https://samsclass.info/127/proj/vuln-server.htm +  * https://samsclass.info/127/proj/vuln-server.htm 
-**************** http://www.rockfishsec.com/2014/01/fuzzing-vulnserver-with-peach-3.html +  * http://www.rockfishsec.com/2014/01/fuzzing-vulnserver-with-peach-3.html 
-********************* http://www.thegreycorner.com/p/vulnserver.html +  * http://www.thegreycorner.com/p/vulnserver.html 
-*********** http://resources.infosecinstitute.com/seh-exploit/ +  * http://resources.infosecinstitute.com/seh-exploit/ 
-*****************https://www.offensive-security.com/vulndev/quickzip-stack-bof-0day-a-box-of-chocolates/+  * https://www.offensive-security.com/vulndev/quickzip-stack-bof-0day-a-box-of-chocolates/
    
    
 Cheatsheets: Cheatsheets:
-https://highon.coffee/blog/lfi-cheat-sheet/ +  * https://highon.coffee/blog/lfi-cheat-sheet/ 
-http://ethicalhacker.io/post/137403906740/osce-exam-prep +  http://ethicalhacker.io/post/137403906740/osce-exam-prep 
-https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet +  https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet 
-http://htmlpurifier.org/live/smoketests/xssAttacks.php +  http://htmlpurifier.org/live/smoketests/xssAttacks.php 
-https://www.bnxnet.com/wp-content/uploads/2015/01/WinAPIs_for_hackers.pdf +  https://www.bnxnet.com/wp-content/uploads/2015/01/WinAPIs_for_hackers.pdf 
-http://www.securepla.net/wiki/index.php?title=Cheat_Sheets +  http://www.securepla.net/wiki/index.php?title=Cheat_Sheets 
-http://www.securepla.net/wiki/index.php?title=Network_Attack_Cheat_Sheet +  http://www.securepla.net/wiki/index.php?title=Network_Attack_Cheat_Sheet 
-https://www.securepla.net/wiki/index.php?title=Web_App_Cheat_Sheet +  https://www.securepla.net/wiki/index.php?title=Web_App_Cheat_Sheet 
-http://www.securepla.net/wiki/index.php?title=Web_Scanning_Cheat_Sheet +  http://www.securepla.net/wiki/index.php?title=Web_Scanning_Cheat_Sheet 
-http://www.securepla.net/wiki/index.php?title=Malware_Cheat_Sheet +  http://www.securepla.net/wiki/index.php?title=Malware_Cheat_Sheet 
-http://sparksandflames.com/files/x86InstructionChart.html+  http://sparksandflames.com/files/x86InstructionChart.html
    
 Good practice sites: Good practice sites:
-http://www.primalsecurity.net/tutorials/exploit-tutorials/ +  * http://www.primalsecurity.net/tutorials/exploit-tutorials/ 
-http://www.securitysift.com/windows-exploit-development-part-6-seh-exploits/ +  http://www.securitysift.com/windows-exploit-development-part-6-seh-exploits/ 
-https://v00d00sec.com/2015/09/14/manually-backdooring-windows-executables/ +  https://v00d00sec.com/2015/09/14/manually-backdooring-windows-executables/ 
-https://www.corelan.be/index.php/articles/ +  https://www.corelan.be/index.php/articles/ 
-http://fuzzysecurity.com/tutorials.html +  http://fuzzysecurity.com/tutorials.html 
-http://exploit-exercises.com/protostar +  http://exploit-exercises.com/protostar 
-http://exploit-exercises.com/fusion +  http://exploit-exercises.com/fusion 
-http://ihazomgsecurityskillz.blogspot.com/ +  http://ihazomgsecurityskillz.blogspot.com/ 
-http://opensecuritytraining.info/Training.html +  http://opensecuritytraining.info/Training.html 
-https://trailofbits.github.io/ctf/index.html +  https://trailofbits.github.io/ctf/index.html 
-http://tuts4you.com/download.php?list.17 +  http://tuts4you.com/download.php?list.17 
-http://tuts4you.com/download.php?list.29 +  http://tuts4you.com/download.php?list.29 
-http://tuts4you.com/download.php?list.3 +  http://tuts4you.com/download.php?list.3 
-http://www.openrce.org/downloads/ +  http://www.openrce.org/downloads/ 
-http://www.securitytube-training.com/online-courses/securitytube-linux-assembly-expert/index.html +  http://www.securitytube-training.com/online-courses/securitytube-linux-assembly-expert/index.html 
-http://tuts4you.com/download.php?list.67 +  http://tuts4you.com/download.php?list.67 
-http://www.binary-auditing.com/ +  http://www.binary-auditing.com/ 
-https://blog.g0tmi1k.com/dvwa/index/ +  https://blog.g0tmi1k.com/dvwa/index/ 
-http://www.vividmachines.com/shellcode/shellcode.html +  http://www.vividmachines.com/shellcode/shellcode.html 
-https://www.exploit-db.com/exploits/17527/ +  https://www.exploit-db.com/exploits/17527/ 
-https://www.exploit-db.com/exploits/11834/ +  https://www.exploit-db.com/exploits/11834/ 
-https://www.exploit-db.com/exploits/11872/ +  https://www.exploit-db.com/exploits/11872/ 
-https://www.exploit-db.com/exploits/11764/ +  https://www.exploit-db.com/exploits/11764/ 
-https://www.exploit-db.com/exploits/11656/ +  https://www.exploit-db.com/exploits/11656/ 
-https://www.exploit-db.com/exploits/33453/ +  https://www.exploit-db.com/exploits/33453/ 
-https://github.com/WebGoat/WebGoat +  https://github.com/WebGoat/WebGoat 
-http://www.gironsec.com/blog/2016/06/backdooring-a-dll/ +  http://www.gironsec.com/blog/2016/06/backdooring-a-dll/ 
-http://blog.knapsy.com/blog/2015/11/25/easy-file-sharing-web-server-v7-dot-2-remote-seh-buffer-overflow-dep-bypass-with-rop/ +  http://blog.knapsy.com/blog/2015/11/25/easy-file-sharing-web-server-v7-dot-2-remote-seh-buffer-overflow-dep-bypass-with-rop/ 
-https://www.offensive-security.com/0day/quick-tftp-poc.py.txt +  https://www.offensive-security.com/0day/quick-tftp-poc.py.txt 
-https://www.exploit-db.com/author/?a=278 +  https://www.exploit-db.com/author/?a=278 
-**** https://samsclass.info/127/proj/p4-lbuf-shell.htm +  * https://samsclass.info/127/proj/p4-lbuf-shell.htm 
-**** http://www.securitysift.com/windows-exploit-development-part-1-basics/ +  * http://www.securitysift.com/windows-exploit-development-part-1-basics/ 
-******* https://securitycafe.ro/2015/10/30/introduction-to-windows-shellcode-development-part1/ +  * https://securitycafe.ro/2015/10/30/introduction-to-windows-shellcode-development-part1/ 
-******* https://securitycafe.ro/2015/12/14/introduction-to-windows-shellcode-development-part-2/ +  * https://securitycafe.ro/2015/12/14/introduction-to-windows-shellcode-development-part-2/ 
-************* http://www.vividmachines.com/shellcode/shellcode.html+  * http://www.vividmachines.com/shellcode/shellcode.html
    
 Vulnerable machines: Vulnerable machines:
Línea 557: Línea 559:
 https://github.com/0x90/wifi-arsenal https://github.com/0x90/wifi-arsenal
 https://github.com/0x90/kali-scripts https://github.com/0x90/kali-scripts
 +
 +
 +https://nets.ec/Main_Page
 +https://old.exploit-db.com/exploits/13284/
 +
 +https://packetstormsecurity.com/files/90146/Ascii-To-Shellcode-Encoder-Decoder-Tool.html
 +
 +
 +https://underc0de.org/foro/hacking/que-es-una-shellcode/
 +
 +https://0x00sec.org/t/linux-shellcoding-part-1-0/289
 +
 +
 +https://packetstormsecurity.com/files/90146/Ascii-To-Shellcode-Encoder-Decoder-Tool.html
 +
 +
 +
 +https://github.com/Grazfather/PracticalMalwareLabs
 +https://github.com/Grazfather/BlackHatPython
 +
 +
 +https://github.com/VulnHub/ctf-writeups
 +
 +
 +https://nullku7.github.io/stuff/vulnhub/walkthrough/2017/05/28/vulnhub-mr-robot.html
 +
 +https://github.com/trustedsec
 +
 +https://exploit.courses/#/challenges
 +
 +
 +https://payatu.com/guide-linux-privilege-escalation/
 +
 +
 +https://github.com/dobin/yookiterm-slides
 +
 +https://exploit.courses/files/bfh2018/content.html
 +
 +https://exploit.courses/files/bfh2017/content.html
 +
 +https://systemoverlord.com/2017/10/24/building-a-home-lab-for-offensive-security-basics.html#pre-made-vms-tools
 +
 +
 +  * https://github.com/xairy/linux-kernel-exploitation
 +
 +
 +
 +https://blog.vonhewitt.com/2018/08/oscp-exam-cram-log-aug-sept-oct-2018/
 +
 +https://www.vortex.id.au/2017/05/pwkoscp-stack-buffer-overflow-practice/
 +
 +
 +
 +https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html
 +
 +https://www.exploit-db.com/exploits/44298
 +
 +
 +https://github.com/jivoi/pentest
 +
 +
 +
 +https://github.com/lucyoa/kernel-exploits
 +
 +
 +https://n0where.net/
 +
 +
 +https://github.com/Manisso/fsociety \\ Fsociety Hacking Tools Pack. A Penetration Testing Framework, you will have every script that a hacker needs
 +
 +
 +
 +Linux Kernel-Mode Rootkit Hunter for 4.4.0-31+.
 +https://github.com/nbulischeck/tyton
 +https://nbulischeck.github.io/tyton/
 +
 +
 +
 +
 +https://github.com/fireeye/flare-vm - FLARE VM - a fully customizable, Windows-based security distribution for malware analysis, incident response, penetration testing, etc.
 +
 +
 +https://n0where.net/
 +
 +
 +
 +
 +https://github.com/frizb/Vanquish \\ Vanquish is a Kali Linux based Enumeration Orchestrator built in Python. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases. The results of each phase are fed into the next phase to identify vulnerabilities that could be leveraged for a remote shell.
 +
 +
 +https://www.youtube.com/watch?v=YoNrNBnmwuY&feature=youtu.be
 +
 +
 +https://github.com/coreb1t/awesome-pentest-cheat-sheets
 +
 +
 +
 +
 +https://www.oracle.com/technetwork/community/developer-vm/index.html
 +
 +
 +https://github.com/buglessdr?tab=repositories
 +
 +
 +https://github.com/buglessdr/oscp-1
 +
 +https://github.com/buglessdr/myarsenal
 +
 +https://github.com/buglessdr/linux-exploit-suggester
 +
 +https://github.com/buglessdr/OSCP-2
 +
 +