# offensive security

- [OSCP](/0xsec/offensive-security/oscp.md)
- [WriteUps](/0xsec/offensive-security/oscp/writeups.md)
- [PortSwigger](/0xsec/offensive-security/oscp/writeups/portswigger.md)
- [SQL injection labs](/0xsec/offensive-security/oscp/writeups/portswigger/sql-injection-labs.md)
- [Exploiting XXE to retrieve data by repurposing a local DTD](/0xsec/offensive-security/oscp/writeups/portswigger/exploiting-xxe-to-retrieve-data-by-repurposing-a-local-dtd.md)
- [PentesterLabs](/0xsec/offensive-security/oscp/writeups/pentesterlabs.md)
- [Recon](/0xsec/offensive-security/oscp/writeups/pentesterlabs/recon.md)
- [HTB](/0xsec/offensive-security/oscp/writeups/htb.md)
- [BoardLight](/0xsec/offensive-security/oscp/writeups/htb/boardlight.md)
- [Lame](/0xsec/offensive-security/oscp/writeups/htb/lame.md)
- [THM](/0xsec/offensive-security/oscp/writeups/thm.md)
- [Walkthroughs](/0xsec/offensive-security/oscp/writeups/thm/walkthroughs.md)
- [Attacktive Directory](/0xsec/offensive-security/oscp/writeups/thm/walkthroughs/attacktive-directory.md)
- [LineKernel](/0xsec/offensive-security/oscp/writeups/thm/walkthroughs/linekernel.md)
- [Day 1 — Linux PrivEsc](/0xsec/offensive-security/oscp/writeups/thm/walkthroughs/day-1-linux-privesc.md): Today is my Day 1 and I am going to solve machine named Linux PrivEsc on TryHackMe lets goo!!!!
- [CTF](/0xsec/offensive-security/oscp/writeups/thm/ctf.md)
- [Page](/0xsec/offensive-security/oscp/writeups/thm/ctf/page.md)
- [BLUE](/0xsec/offensive-security/oscp/writeups/thm/ctf/blue.md): OS: Windows
- [mKingdom](/0xsec/offensive-security/oscp/writeups/thm/ctf/mkingdom.md)
- [RazorBlack](/0xsec/offensive-security/oscp/writeups/thm/ctf/razorblack.md)
- [Module 1 (General Info)](/0xsec/offensive-security/oscp/module-1-general-info.md)
- [Module 2 (Getting Kali)](/0xsec/offensive-security/oscp/module-2-getting-kali.md)
- [Leason 1 - Booting Up Kali Linux](/0xsec/offensive-security/oscp/module-2-getting-kali/leason-1-booting-up-kali-linux.md)
- [Leason 2 - The Kali Menu](/0xsec/offensive-security/oscp/module-2-getting-kali/leason-2-the-kali-menu.md)
- [Leason 4 - Finding Your Way Around Kali](/0xsec/offensive-security/oscp/module-2-getting-kali/leason-4-finding-your-way-around-kali.md)
- [Leason 5 - Managing Kali Linux Services](/0xsec/offensive-security/oscp/module-2-getting-kali/leason-5-managing-kali-linux-services.md)
- [Module 3 (CLI)](/0xsec/offensive-security/oscp/module-3-cli.md)
- [The Bash Environment](/0xsec/offensive-security/oscp/module-3-cli/the-bash-environment.md)
- [Piping and Redirection](/0xsec/offensive-security/oscp/module-3-cli/piping-and-redirection.md)
- [Text Searching and Manipulation](/0xsec/offensive-security/oscp/module-3-cli/text-searching-and-manipulation.md)
- [Managing Processes](/0xsec/offensive-security/oscp/module-3-cli/managing-processes.md)
- [File and Command Monitoring](/0xsec/offensive-security/oscp/module-3-cli/file-and-command-monitoring.md)
- [Module 4 (Practical Tools)](/0xsec/offensive-security/oscp/module-4-practical-tools.md)
- [Netcat](/0xsec/offensive-security/oscp/module-4-practical-tools/netcat.md)
- [Socat](/0xsec/offensive-security/oscp/module-4-practical-tools/socat.md): The abbreviation of the tool name is Socket Cat
- [PowerShell & Powercat](/0xsec/offensive-security/oscp/module-4-practical-tools/powershell-and-powercat.md)
- [Wireshark](/0xsec/offensive-security/oscp/module-4-practical-tools/wireshark.md)
- [Tcpdump](/0xsec/offensive-security/oscp/module-4-practical-tools/tcpdump.md)
- [Module 5 (Bash Script)](/0xsec/offensive-security/oscp/module-5-bash-script.md): Black Hat Bash book
- [Module 6 (Passive Info Gathering)](/0xsec/offensive-security/oscp/module-6-passive-info-gathering.md)
- [Module 7 ( Active Info Gathering)](/0xsec/offensive-security/oscp/module-7-active-info-gathering.md)
- [Module 8 (Vulnerability Scanning)](/0xsec/offensive-security/oscp/module-8-vulnerability-scanning.md)
- [Module 9 (Web Application Attacks)](/0xsec/offensive-security/oscp/module-9-web-application-attacks.md)
- [Cross Site Scripting (XSS)](/0xsec/offensive-security/oscp/module-9-web-application-attacks/cross-site-scripting-xss.md): Reflected XSS Stored  XSS DOM XSS self XSS
- [local file inclusion & remote file inclusion](/0xsec/offensive-security/oscp/module-9-web-application-attacks/local-file-inclusion-and-remote-file-inclusion.md)
- [Exploit LFI](/0xsec/offensive-security/oscp/module-9-web-application-attacks/local-file-inclusion-and-remote-file-inclusion/exploit-lfi.md)
- [SQL injection](/0xsec/offensive-security/oscp/module-9-web-application-attacks/sql-injection.md)
- [Blind Boolean based SQL & Evasion Techniques](/0xsec/offensive-security/oscp/module-9-web-application-attacks/sql-injection/blind-boolean-based-sql-and-evasion-techniques.md)
- [SQL](/0xsec/offensive-security/oscp/module-9-web-application-attacks/sql-injection/sql.md)
- [Login bypass List](/0xsec/offensive-security/oscp/module-9-web-application-attacks/sql-injection/login-bypass-list.md)
- [File upload](/0xsec/offensive-security/oscp/module-9-web-application-attacks/file-upload.md)
- [Remote code execution](/0xsec/offensive-security/oscp/module-9-web-application-attacks/remote-code-execution.md)
- [Module 10 ( Intro Buffer OverFlow)](/0xsec/offensive-security/oscp/module-10-intro-buffer-overflow.md)
- [Module 11 (Widows Buffer OverFlow)](/0xsec/offensive-security/oscp/module-11-widows-buffer-overflwo.md)
- [Buffer OverFlow Challange](/0xsec/offensive-security/oscp/module-11-widows-buffer-overflwo/buffer-overflow-challange.md)
- [Module 12 (Linux Buffer OverFlows)](/0xsec/offensive-security/oscp/module-12-linux-buffer-overflows.md)
- [Module 13 (Clint Side Attacks)](/0xsec/offensive-security/oscp/module-13-clint-side-attacks.md)
- [Module 14 (Locating Public Exploits)](/0xsec/offensive-security/oscp/module-14-locating-public-exploits.md)
- [Module 15 (FIxing Exploits)](/0xsec/offensive-security/oscp/module-15-fixing-exploits.md)
- [Module 16 (File Transfers)](/0xsec/offensive-security/oscp/module-16-file-transfers.md)
- [Module 17 (Antivirus Evasion)](/0xsec/offensive-security/oscp/module-17-antivirus-evasion.md)
- [Windows](/0xsec/offensive-security/oscp/module-17-antivirus-evasion/windows.md)
- [Module 18 (Privllege Escalation)](/0xsec/offensive-security/oscp/module-18-privllege-escalation.md)
- [Windows](/0xsec/offensive-security/oscp/module-18-privllege-escalation/windows.md)
- [Checklist](/0xsec/offensive-security/oscp/module-18-privllege-escalation/windows/checklist.md)
- [THM - Windows PrivEsc Arena](/0xsec/offensive-security/oscp/module-18-privllege-escalation/windows/thm-windows-privesc-arena.md)
- [Linux](/0xsec/offensive-security/oscp/module-18-privllege-escalation/linux.md)
- [Checklist](/0xsec/offensive-security/oscp/module-18-privllege-escalation/linux/checklist.md)
- [Linux PrivEsc Arena](/0xsec/offensive-security/oscp/module-18-privllege-escalation/linux/linux-privesc-arena.md)
- [Module 19 (Password Attacks)](/0xsec/offensive-security/oscp/module-19-password-attacks.md)
- [Module 20 (Port Redirection and Tunneling)](/0xsec/offensive-security/oscp/module-20-port-redirection-and-tunneling.md)
- [Module 21 (Active Directory Attacks)](/0xsec/offensive-security/oscp/module-21-active-directory-attacks.md)
- [adbasics\_v1.2](/0xsec/offensive-security/oscp/module-21-active-directory-attacks/adbasics_v1.2.md)
- [Module 22 (Metasploit Framwork)](/0xsec/offensive-security/oscp/module-22-metasploit-framwork.md)
- [Module 23 (Powershell Empire)](/0xsec/offensive-security/oscp/module-23-powershell-empire.md)
- [Course Materials](/0xsec/offensive-security/oscp/course-materials.md)
