discovered 30 Mar 2026
OSCE3-Complete-Guide
→ View on GitHubAI Summary: The OSCE³ and OSEE Study Guide provides comprehensive resources for mastering web security concepts and techniques relevant to the Offensive Security Certified Expert (OSCE) and Offensive Security Exploitation Expert (OSEE) certifications. Its primary use case is to aid cybersecurity professionals in studying various attack vectors and methodologies, including but not limited to SQL injections, cross-site scripting, and remote code execution. Notable features include an extensive list of reference materials, as well as detailed discussions of numerous vulnerabilities and exploitation strategies.
README
OSCE³ and OSEE Study Guide 
OSWE
Content
- Web security tools and methodologies
- Source code analysis
- Persistent cross-site scripting
- Session hijacking
- .NET deserialization
- Remote code execution
- Blind SQL injections
- Data exfiltration
- Bypassing file upload restrictions and file extension filters
- PHP type juggling with loose comparisons
- PostgreSQL Extension and User Defined Functions
- Bypassing REGEX restrictions
- Magic hashes
- Bypassing character restrictions
- UDF reverse shells
- PostgreSQL large objects
- DOM-based cross site scripting (black box)
- Server side template injection
- Weak random token generation
- XML External Entity Injection
- RCE via database Functions
- OS Command Injection via WebSockets (BlackBox)
Study Materials
- timip-GitHub- Reference guide
- noraj-GitHub - Reference guide
- wetw0rk-Github - Reference guide
- kajalNair-Github - Reference guide
- s0j0hn-Github - Reference guide
- deletehead-Github - Reference guide
- z-r0crypt - Reference guide
- rayhan0x01 - Reference guide
- Nathan-Rague - Reference guide
- Joas Content - Reference guide
- Lawlez-Github - Reference guide
- 0xb120 - Reference Guide
- Jaelkoh
- snoopysecurity - Reference Guide
- aaidanquimby - Reference Guide
Vulnerabilities
- XXE Injection
- CSRF
- Cross-Site Scripting Exploitation
- Cross-Site Scripting (XSS)
- Unrestricted File Upload
- Open Redirect
- Remote File Inclusion (RFI)
- HTML Injection
- Path Traversal
- Broken Authentication & Session Management
- OS Command Injection
- Multiple Ways to Banner Grabbing
- Local File Inclusion (LFI)
- Netcat for Pentester
- WPScan:WordPress Pentesting Framework
- WordPress Pentest Lab Setup in Multiple Ways
- Multiple Ways to Crack WordPress login
- Web Application Pentest Lab Setup on AWS
- Web Application Lab Setup on Windows
- Web Application Pentest Lab setup Using Docker
- Web Shells Penetration Testing
- SMTP Log Poisoning
- HTTP Authentication
- Understanding the HTTP Protocol
- Broken Authentication & Session Management
- Apache Log Poisoning through LFI
- Beginner’s Guide to SQL Injection (Part 1)
- Boolean Based
- How to Bypass SQL Injection Filter
- Form Based SQL Injection
- Dumping Database using Outfile
- IDOR
Reviews
- OSWE Review - Portuguese Content
- 0xklaue
- greenwolf security
- Cristian R
- 21y4d - Exam Reviews
- Marcin Szydlowski
- Nathan Rague
- Elias Dimopoulos
- OSWE Review - Tips & Tricks - OSWE Review - Tips & Tricks
- Alex-labs
- niebardzo Github - Exam Review
- Marcus Aurelius
- yakuhito
- donavan.sg
- Alexei Kojenov
- (OSWE)-Journey & Review - Offensive Security Web Expert (OSWE) - Journey & Review
- Patryk Bogusz
- svdwi GitHub - OSWE Labs POC
- Werebug.com - OSWE and OSEP
- jvesiluoma
- ApexPredator
- Thomas Peterson
- NOH4TS
- Alex
- RCESecurity
- Dhakal
- Karol Mazurek
- 4PFSec
- Cobalt.io
- hakansonay
- Jake Mayhew
- Organic Security
- Bitten Tech
- What is OSWE Certification – StationX
- OSCP and OSWE Journey – Adam Bartlett
- OSWE Notes – Secdomain
- OSWE Resources – saunders-jake
- OSWE Review - steflan
Extra Content
- OSWE labs - OSWE labs and exam’s review/guide
- HTB Machine
- Deserialization
- B1twis3
- jangelesg GitHub
- rootshooter
- svdwi
OSEP
Content
- Operating System and Programming Theory
- Client Side Code Execution With Office
- Client Side Code Execution With Jscript
- Process Injection and Migration
- Introduction to Antivirus Evasion
- Advanced Antivirus Evasion
- Application Whitelisting
- Bypassing Network Filters
- Linux Post-Exploitation
- Kiosk Breakouts
- Windows Credentials
- Windows Lateral Movement
- Linux Lateral Movement
- Microsoft SQL Attacks
- Active Directory Exploitation
- Combining the Pieces
- Trying Harder: The Labs
Study Materials
- OSEP Code Snippets
- Experienced Pentester OSEP
- OSEP Pre
- PEN 300 OSEP Prep
- OSEP Thoughts
- OSEP Code Snippets README
- Osep
- Google Drive File
- Awesome Red Team Operations
- OSEP Study Guide 2022 - João Paulo de Andrade Filho
- OSEP PREP Useful Resources Payloads
- OSEP in3x0rab13
- OSEP forsec
Reviews
- nullg0re
- SpaceRaccoon Dev
- HackSouth YouTube
- Schellman
- Cinzinga
- YouTube iUPyiJbN4l4
- BorderGate
- Reddit OSEP Review
- Reddit OSCP Review
- Purpl3F0xSecur1ty
- MakoSecBlog
- YouTube iUPyiJbN4l4
- YouTube 15sv5eZ0oCM
- YouTube 0n3Li63PwnQ
- YouTube BWNzB1wIEQ
- SpaceRaccoon Dev
- Cas van Cooten
- BorderGate
- MakoSecBlog
- David Lebr1 GitBook
- Offensive Security
- João Paulo de Andrade Filho LinkedIn
- YouTube R1apMwbVuDs
- YouTube iUPyiJbN4l4
- Cristian Cornea Medium
- Security Boulevard
- YouTube R1apMwbVuDs
- Fluid Attacks
- Heartburn.dev
- YouTube FVZkVZKIyOA
- RootJaxk
- Dhruvagoyal
- IT Security Labs
- Benjamen Lim
- Marmeus
- Winslow
- Jakob Bo Moller
- swzhouu
- My Review on OSEP 2025
- OSEP Certification Overview – StationX
- I Passed OSEP with secret.txt and So Can You
- OSED vs OSEP Review – 0xbad53c
- OSEP Prep Notes – Ross46
- OSEPlayground – Extravenger
- YouTube – OSEP Review Video
Labs
- SpaceRaccoon Dev - OSEP Review and Exam
- Exploit-DB - Evasion Techniques Breaching Defenses
- OSCP Exam Report Template Markdown
- Offensive Security - OSEP Exam FAQ
- CyberEagle - OSEP Review
- PentestLab - Defense Evasion
- PentestLab - Antivirus Evasion
- PentestLaboratories - Process Herpaderping Windows Defender Evasion
- YouTube - PentesterAcademyTV
- YouTube - PacktVideo
- YouTube - PentesterAcademyTV
- GitHub - In3x0rabl3/OSEP
- GitHub - timip/OSEP
OSED
Content
- WinDbg tutorial
- Stack buffer overflows
- Exploiting SEH overflows
- Intro to IDA Pro
- Overcoming space restrictions: Egghunters
- Shellcode from scratch
- Reverse-engineering bugs
- Stack overflows and DEP/ASLR bypass
- Format string specifier attacks
- Custom ROP chains and ROP payload decoders
Study Materials
- snoopysecurity - OSCE Prep
- epi052 - OSED Scripts
- Exploit-DB - Windows User Mode Exploit Development
- r0r0x-xx - OSED Pre
- sradley - OSED
- Nero22k - Exploit Development
- YouTube - 7PMw9GIb8Zs
- YouTube - FH1KptfPLKo
- YouTube - sOMmzUuwtmc
- ExploitLab Blog
- Azeria Labs - Heap Exploit Development Part 1
- ZeroKnights - Getting Started Exploit Lab
- Google Drive File 1
- Google Drive File 2
- Google Drive File 3
- Corelan - Exploit Writing Tutorial Part 1: Stack Based Overflows
- wtsxDev - Exploit Development
- corelan - Corelan Training
- subat0mik - Journey to OSCE
- nanotechz9l - Corelan Exploit Tutorial Part 1: Stack Based Overflows
- snoopysecurity - OSCE Prep
- bigb0sss - OSCE
- epi052 - OSCE Exam Practice
- mdisec - OSCE Preparation
- mohitkhemchandani - OSCE BIBLE
- FULLSHADE - OSCE
- areyou1or0 - OSCE Exploit Development
- securityELI - CTP OSCE
- Google Drive File 4
- Coalfire Blog - The Basics of Exploit Development
- Connor McGarr - Browser Exploit
- KaliTut - Exploit Development Resources
- 0xZ0F - Z0FCourse Exploit Development
- dest-3 - OSED Resources
- Infosec Institute - Python for Exploit Development
- Anitian - A Study in Exploit Development Part 1: Setup and Proof of Concept
- Sam’s Class - WWC 2014
- Stack Overflow - Exploit Development in Python 3
- CTF Writeups - Converting Metasploit Modules to Python
- PacktPub - Networking and Servers
- Cybrary - Exploit Development Part 5
- SpaceRaccoon - ROP and Roll EXP-301 Offensive Security Exploit Development (OSED) Review
- Offensive Security - OSED Exam Guide
- epi052 - OSED Scripts
- YouTube - 0n3Li63PwnQ
- epi052 - Windows Usermode Exploit Development Review
- PythonRepo - epi052 OSED Scripts
- dhn - OSEE
- PythonRepo - epi052 OSED Scripts
- nop-tech - OSED
- Ired Team - ROP Chaining Return Oriented Programming
- InfoSec Writeups - ROP Chains on ARM
- YouTube - 8zRoMAkGYQE
- Infosec Institute - Return Oriented Programming ROP Attacks
- dest-3 - OSED Resources
- mrtouch93 - OSED Notes
- wry4n - OSED Scripts
- r0r0x-xx - OSED Pre
Reviews
- YouTube - aWHL9hIKTCA
- YouTube - 62mWZ1xd8eM
- ihack4falafel - Offensive Security AWEOSEE Review
- LinkedIn - Advanced Windows Exploitation (OSEE) Review - Etizaz Mohsin
- Animal0day - Reviews for OSCP, OSCE, OSEE, and Corelan
- AddaxSoft - Offensive Security Advanced Windows Exploitation (AWE/OSEE) Review
- jhalon - OSCE Review
- YouTube - NAe6f1_XG6Q
- SpaceRaccoon - ROP and Roll EXP-301 Offensive Security Exploit Development (OSED) Review
- kuhi.to - OFFSEC EXP301 OSED Review
- epi052 - Windows Usermode Exploit Development Review
- SpaceRaccoon - ROP and Roll EXP-301 Offensive Security Exploit Development (OSED) Review
- YouTube - NAe6f1_XG6Q
- LinkedIn - Offensive Security Certified Expert 3 (OSCE3) - Cristian Cornea
- NOP Blog - OSED
- Deep Hacking - OSED Review
- OSED Review – Navigating The Shadows
- OSED Review - cydtseng
- OSED Review - insanitys
- OSCE3 Journey - Fabian
Labs
- CyberSecurityUP - Buffer Overflow Labs
- ihack4falafel - OSCE
- nathunandwani - CTP OSCE
- sufyandaredevil - OSED - Exploiting SEH Overflows
- firmianay - Life-long Learner - SEED Labs - Buffer Overflow Vulnerability Lab
- wadejason - Buffer Overflow Vulnerability Lab
- Jeffery-Liu - Buffer Overflow Vulnerability Lab
- mutianxu - SEED LAB - Buffer Overflow Attack
- INE - Windows Exploit Development
- Connor McGarr - Browser Exploit
- Coalfire Blog - The Basics of Exploit Development
- Pentest Magazine - Exploit Development Windows
- Steflan Security - Complete Guide to Stack Buffer Overflow (OSCP)
- Offensive Security - EVOCAM Remote Buffer Overflow on OSX
- Exploit-DB - Exploit 42928
- Exploit-DB - Exploit 10434
- OCW CS PUB RO - Lab 08
- epi052 - OSED Scripts
- PWN College
- CEDS by Red Team Leaders
OSEE
Content
- Bypass and evasion of user mode security mitigations such as DEP, ASLR, CFG, ACG and CET
- Advanced heap manipulations to obtain code execution along with guest-to-host and sandbox escapes
- Disarming WDEG mitigations and creating version independence for weaponization
- 64-Bit Windows Kernel Driver reverse engineering and vulnerability discovery
- Bypass of kernel mode security mitigations such as kASLR, NX, SMEP, SMAP, kCFG and HVCI
Study Materials
- Advanced Windows Exploitation (OSEE) Review – Etizaz Mohsin
- State of Exploit Development Part 2 – CrowdStrike
- BlackHat – Windows Kernel Exploitation (Video)
- NCC Group – Windows Exploit Mitigations
- Sandbox Escapes Collection – TechnoHerder
- Zero Day Initiative – Kernel Exploitation (1)
- Zero Day Initiative – Kernel Exploitation (2)
- BlackHat – Bypassing Modern Windows Protections
- VirtualBox E1000 0-Day
- Palantir – Assessing Effectiveness of Defender Exploit Guard
- ExploitGuard – Palantir GitHub
- Windows Classic Samples – Microsoft
- How to Hook Windows API using C++
- Windows API with Python
- Windows API for Pentesting – int0x33
Reviews
- AWEOSEE Review – ihack4falafel
- Advanced Windows Exploitation Review – Richard Osgood
- OSEE Review Video – David Alves
- My Offensive Security Journey – 0xInyiak
- OSEE Review
- OSEE Review by Jake Mayhew
- Journey OSEE
- OSEE Ultimate Guide
Labs
- EXP-401-OSEE – BLACKHAT-SSG
- OSEE – timip
- OSEE – dhn
- AWE-OSEE-Prep – orangice
- AWE-OSEE-Prep – matthiaskonrath
- OSEE – ihack4falafel
- OSEE – gscamelo
- 3XPL01t5 – w4fz5uck5
- CWDE - Red Team Leaders