### General - [LainKusanagi list of OSCP-like machines](https://docs.google.com/spreadsheets/u/0/d/18weuz_Eeynr6sXFQ87Cd5F0slOj9Z6rt/htmlview?pli=1) - [TJNull OSCP-like machines](https://docs.google.com/spreadsheets/u/1/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/htmlview# ) - [ss64](https://ss64.com) - https://medium.com/@got-root - DerronC - AD ### Hacktricks - [HackTricks](https://book.hacktricks.wiki/en/index.html) ### Hash - [hashcat example-hashes](https://hashcat.net/wiki/doku.php?id=example_hashes) ### Reverse Shell Generator - [Revshells.com](https://www.revshells.com/) - [PayloadAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md) ### Privilege Escalation - [Cron Guru](https://crontab.guru/) - [GTFObins](https://gtfobins.github.io/) - [LOLBAS](https://lolbas-project.github.io/) - [Windows Kernel Exploits](https://github.com/SecWiki/windows-kernel-exploits) ### Helpful writing - https://www.reddit.com/r/oscp/comments/1f5ojaq/assumed_breach_ad_what_you_may_need_to_know/ - https://medium.com/an-idea/oscp-exam-secrets-avoiding-rabbit-holes-and-staying-on-track-514d79adb214 - https://osintteam.blog/oscp-exam-success-10-must-know-commands-and-tools-every-pentester-should-master-4b514bf64ccd - https://medium.com/@Dpsypher/proving-grounds-practice-hetemit-a66be76a6503