- Web security tools and methodologies
 - Source code analysis
 - Persistent cross-site scripting
 - Session hijacking
 - .NET deserialization
 - Remote code execution
 - Blind SQL injections
 - Data exfiltration
 - Bypassing file upload restrictions and file extension filters
 - PHP type juggling with loose comparisons
 - PostgreSQL Extension and User Defined Functions
 - Bypassing REGEX restrictions
 - Magic hashes
 - Bypassing character restrictions
 - UDF reverse shells
 - PostgreSQL large objects
 - DOM-based cross site scripting (black box)
 - Server side template injection
 - Weak random token generation
 - XML External Entity Injection
 - RCE via database Functions
 - OS Command Injection via WebSockets (BlackBox)
 
- timip-GitHub- Reference guide
 - noraj-GitHub - Reference guide
 - wetw0rk-Github - Reference guide
 - kajalNair-Github - Reference guide
 - s0j0hn-Github - Reference guide
 - deletehead-Github - Reference guide
 - z-r0crypt - Reference guide
 - rayhan0x01 - Reference guide
 - Nathan-Rague - Reference guide
 - Joas Content - Reference guide
 - Lawlez-Github - Reference guide
 - 0xb120 - Reference Guide
 - Jaelkoh
 
- XXE Injection
 - CSRF
 - Cross-Site Scripting Exploitation
 - Cross-Site Scripting (XSS)
 - Unrestricted File Upload
 - Open Redirect
 - Remote File Inclusion (RFI)
 - HTML Injection
 - Path Traversal
 - Broken Authentication & Session Management
 - OS Command Injection
 - Multiple Ways to Banner Grabbing
 - Local File Inclusion (LFI)
 - Netcat for Pentester
 - WPScan:WordPress Pentesting Framework
 - WordPress Pentest Lab Setup in Multiple Ways
 - Multiple Ways to Crack WordPress login
 - Web Application Pentest Lab Setup on AWS
 - Web Application Lab Setup on Windows
 - Web Application Pentest Lab setup Using Docker
 - Web Shells Penetration Testing
 - SMTP Log Poisoning
 - HTTP Authentication
 - Understanding the HTTP Protocol
 - Broken Authentication & Session Management
 - Apache Log Poisoning through LFI
 - Beginner’s Guide to SQL Injection (Part 1)
 - Boolean Based
 - How to Bypass SQL Injection Filter
 - Form Based SQL Injection
 - Dumping Database using Outfile
 - IDOR
 
- OSWE Review - Portuguese Content
 - 0xklaue
 - greenwolf security
 - Cristian R
 - 21y4d - Exam Reviews
 - Marcin Szydlowski
 - Nathan Rague
 - Elias Dimopoulos
 - OSWE Review - Tips & Tricks - OSWE Review - Tips & Tricks
 - Alex-labs
 - niebardzo Github - Exam Review
 - Marcus Aurelius
 - yakuhito
 - donavan.sg
 - Alexei Kojenov
 - (OSWE)-Journey & Review - Offensive Security Web Expert (OSWE) - Journey & Review
 - Patryk Bogusz
 - svdwi GitHub - OSWE Labs POC
 - Werebug.com - OSWE and OSEP
 - jvesiluoma
 - ApexPredator
 - Thomas Peterson
 - NOH4TS
 - Alex
 - RCESecurity
 - Dhakal
 - Karol Mazurek
 - 4PFSec
 - Cobalt.io
 - hakansonay
 - Jake Mayhew
 - Organic Security
 - Bitten Tech
 - What is OSWE Certification – StationX
 - OSCP and OSWE Journey – Adam Bartlett
 - OSWE Notes – Secdomain
 - OSWE Resources – saunders-jake
 
- OSWE labs - OSWE labs and exam's review/guide
 - HTB Machine
 - Deserialization
 - B1twis3
 - jangelesg GitHub
 - rootshooter
 - svdwi
 
- Operating System and Programming Theory
 - Client Side Code Execution With Office
 - Client Side Code Execution With Jscript
 - Process Injection and Migration
 - Introduction to Antivirus Evasion
 - Advanced Antivirus Evasion
 - Application Whitelisting
 - Bypassing Network Filters
 - Linux Post-Exploitation
 - Kiosk Breakouts
 - Windows Credentials
 - Windows Lateral Movement
 - Linux Lateral Movement
 - Microsoft SQL Attacks
 - Active Directory Exploitation
 - Combining the Pieces
 - Trying Harder: The Labs
 
- OSEP Code Snippets
 - Experienced Pentester OSEP
 - OSEP Pre
 - PEN 300 OSEP Prep
 - OSEP Thoughts
 - OSEP Code Snippets README
 - Osep
 - Google Drive File
 - Awesome Red Team Operations
 - OSEP Study Guide 2022 - João Paulo de Andrade Filho
 - OSEP PREP Useful Resources Payloads
 - OSEP in3x0rab13
 - OSEP forsec
 
- nullg0re
 - SpaceRaccoon Dev
 - HackSouth YouTube
 - Schellman
 - Cinzinga
 - YouTube iUPyiJbN4l4
 - BorderGate
 - Reddit OSEP Review
 - Reddit OSCP Review
 - Purpl3F0xSecur1ty
 - MakoSecBlog
 - YouTube iUPyiJbN4l4
 - YouTube 15sv5eZ0oCM
 - YouTube 0n3Li63PwnQ
 - YouTube BWNzB1wIEQ
 - SpaceRaccoon Dev
 - Cas van Cooten
 - BorderGate
 - MakoSecBlog
 - David Lebr1 GitBook
 - Offensive Security
 - João Paulo de Andrade Filho LinkedIn
 - YouTube R1apMwbVuDs
 - YouTube iUPyiJbN4l4
 - Cristian Cornea Medium
 - Security Boulevard
 - YouTube R1apMwbVuDs
 - Fluid Attacks
 - Heartburn.dev
 - YouTube FVZkVZKIyOA
 - RootJaxk
 - Dhruvagoyal
 - IT Security Labs
 - Benjamen Lim
 - Marmeus
 - Winslow
 - Jakob Bo Moller
 - swzhouu
 - My Review on OSEP 2025
 - OSEP Certification Overview – StationX
 - I Passed OSEP with secret.txt and So Can You
 - OSED vs OSEP Review – 0xbad53c
 - OSEP Prep Notes – Ross46
 - OSEPlayground – Extravenger
 - YouTube – OSEP Review Video
 
- SpaceRaccoon Dev - OSEP Review and Exam
 - Exploit-DB - Evasion Techniques Breaching Defenses
 - OSCP Exam Report Template Markdown
 - Offensive Security - OSEP Exam FAQ
 - CyberEagle - OSEP Review
 - PentestLab - Defense Evasion
 - PentestLab - Antivirus Evasion
 - PentestLaboratories - Process Herpaderping Windows Defender Evasion
 - YouTube - PentesterAcademyTV
 - YouTube - PacktVideo
 - YouTube - PentesterAcademyTV
 - GitHub - In3x0rabl3/OSEP
 - GitHub - timip/OSEP
 
- WinDbg tutorial
 - Stack buffer overflows
 - Exploiting SEH overflows
 - Intro to IDA Pro
 - Overcoming space restrictions: Egghunters
 - Shellcode from scratch
 - Reverse-engineering bugs
 - Stack overflows and DEP/ASLR bypass
 - Format string specifier attacks
 - Custom ROP chains and ROP payload decoders
 
- snoopysecurity - OSCE Prep
 - epi052 - OSED Scripts
 - Exploit-DB - Windows User Mode Exploit Development
 - r0r0x-xx - OSED Pre
 - sradley - OSED
 - Nero22k - Exploit Development
 - YouTube - 7PMw9GIb8Zs
 - YouTube - FH1KptfPLKo
 - YouTube - sOMmzUuwtmc
 - ExploitLab Blog
 - Azeria Labs - Heap Exploit Development Part 1
 - ZeroKnights - Getting Started Exploit Lab
 - Google Drive File 1
 - Google Drive File 2
 - Google Drive File 3
 - Corelan - Exploit Writing Tutorial Part 1: Stack Based Overflows
 - wtsxDev - Exploit Development
 - corelan - Corelan Training
 - subat0mik - Journey to OSCE
 - nanotechz9l - Corelan Exploit Tutorial Part 1: Stack Based Overflows
 - snoopysecurity - OSCE Prep
 - bigb0sss - OSCE
 - epi052 - OSCE Exam Practice
 - mdisec - OSCE Preparation
 - mohitkhemchandani - OSCE BIBLE
 - FULLSHADE - OSCE
 - areyou1or0 - OSCE Exploit Development
 - securityELI - CTP OSCE
 - Google Drive File 4
 - Coalfire Blog - The Basics of Exploit Development
 - Connor McGarr - Browser Exploit
 - KaliTut - Exploit Development Resources
 - 0xZ0F - Z0FCourse Exploit Development
 - dest-3 - OSED Resources
 - Infosec Institute - Python for Exploit Development
 - Anitian - A Study in Exploit Development Part 1: Setup and Proof of Concept
 - Sam's Class - WWC 2014
 - Stack Overflow - Exploit Development in Python 3
 - CTF Writeups - Converting Metasploit Modules to Python
 - PacktPub - Networking and Servers
 - Cybrary - Exploit Development Part 5
 - SpaceRaccoon - ROP and Roll EXP-301 Offensive Security Exploit Development (OSED) Review
 - Offensive Security - OSED Exam Guide
 - epi052 - OSED Scripts
 - YouTube - 0n3Li63PwnQ
 - epi052 - Windows Usermode Exploit Development Review
 - PythonRepo - epi052 OSED Scripts
 - dhn - OSEE
 - PythonRepo - epi052 OSED Scripts
 - nop-tech - OSED
 - Ired Team - ROP Chaining Return Oriented Programming
 - InfoSec Writeups - ROP Chains on ARM
 - YouTube - 8zRoMAkGYQE
 - Infosec Institute - Return Oriented Programming ROP Attacks
 - dest-3 - OSED Resources
 - mrtouch93 - OSED Notes
 - wry4n - OSED Scripts
 - r0r0x-xx - OSED Pre
 
- YouTube - aWHL9hIKTCA
 - YouTube - 62mWZ1xd8eM
 - ihack4falafel - Offensive Security AWEOSEE Review
 - LinkedIn - Advanced Windows Exploitation (OSEE) Review - Etizaz Mohsin
 - Animal0day - Reviews for OSCP, OSCE, OSEE, and Corelan
 - AddaxSoft - Offensive Security Advanced Windows Exploitation (AWE/OSEE) Review
 - jhalon - OSCE Review
 - YouTube - NAe6f1_XG6Q
 - SpaceRaccoon - ROP and Roll EXP-301 Offensive Security Exploit Development (OSED) Review
 - kuhi.to - OFFSEC EXP301 OSED Review
 - epi052 - Windows Usermode Exploit Development Review
 - SpaceRaccoon - ROP and Roll EXP-301 Offensive Security Exploit Development (OSED) Review
 - YouTube - NAe6f1_XG6Q
 - LinkedIn - Offensive Security Certified Expert 3 (OSCE3) - Cristian Cornea
 - NOP Blog - OSED
 - Deep Hacking - OSED Review
 - OSED Review – Navigating The Shadows
 
- CyberSecurityUP - Buffer Overflow Labs
 - ihack4falafel - OSCE
 - nathunandwani - CTP OSCE
 - sufyandaredevil - OSED - Exploiting SEH Overflows
 - firmianay - Life-long Learner - SEED Labs - Buffer Overflow Vulnerability Lab
 - wadejason - Buffer Overflow Vulnerability Lab
 - Jeffery-Liu - Buffer Overflow Vulnerability Lab
 - mutianxu - SEED LAB - Buffer Overflow Attack
 - INE - Windows Exploit Development
 - Connor McGarr - Browser Exploit
 - Coalfire Blog - The Basics of Exploit Development
 - Pentest Magazine - Exploit Development Windows
 - Steflan Security - Complete Guide to Stack Buffer Overflow (OSCP)
 - Offensive Security - EVOCAM Remote Buffer Overflow on OSX
 - Exploit-DB - Exploit 42928
 - Exploit-DB - Exploit 10434
 - OCW CS PUB RO - Lab 08
 - epi052 - OSED Scripts
 
- Bypass and evasion of user mode security mitigations such as DEP, ASLR, CFG, ACG and CET
 - Advanced heap manipulations to obtain code execution along with guest-to-host and sandbox escapes
 - Disarming WDEG mitigations and creating version independence for weaponization
 - 64-Bit Windows Kernel Driver reverse engineering and vulnerability discovery
 - Bypass of kernel mode security mitigations such as kASLR, NX, SMEP, SMAP, kCFG and HVCI
 
- Advanced Windows Exploitation (OSEE) Review – Etizaz Mohsin
 - State of Exploit Development Part 2 – CrowdStrike
 - BlackHat – Windows Kernel Exploitation (Video)
 - NCC Group – Windows Exploit Mitigations
 - Sandbox Escapes Collection – TechnoHerder
 - Zero Day Initiative – Kernel Exploitation (1)
 - Zero Day Initiative – Kernel Exploitation (2)
 - BlackHat – Bypassing Modern Windows Protections
 - VirtualBox E1000 0-Day
 - Palantir – Assessing Effectiveness of Defender Exploit Guard
 - ExploitGuard – Palantir GitHub
 - Windows Classic Samples – Microsoft
 - How to Hook Windows API using C++
 - Windows API with Python
 - Windows API for Pentesting – int0x33
 
- AWEOSEE Review – ihack4falafel
 - Advanced Windows Exploitation Review – Richard Osgood
 - OSEE Review Video – David Alves
 - My Offensive Security Journey – 0xInyiak