Practical OSCP preparation resources, tooling, notes, walkthrough references, and reporting setup.
If this project helps you, consider supporting my work:
WIP
Browse OSCP-related notes, commands, techniques, walkthrough references, and searchable machine resources:
Tip: Use the tags on https://strikoder.com/oscp to search by topic, then cross-check the techniques, commands, and methodology with the machines listed in Strilist - OSCP to see practical usage examples on specific targets.
📺 Video walkthrough:
https://youtu.be/dT7XgN8uuSU
To install and run the setup script in one command:
bash <(curl -fsSL https://raw.githubusercontent.com/strikoder/OSCP-Prep/main/Report/sysreptor_setup.sh)Note: The watermark may appear at the front of code blocks, which can affect reproducibility when submitting the report.
To remove it, go to:
Design → OSCP → PDF DesignerThen delete:
<div v-if="report.watermark" id="watermark-osid">{{ report.osid }}</div>
Public exploit references, PoCs, and vulnerability research collections:
- https://github.com/stars/strikoder/lists/cve-poc-implementations
- https://github.com/strikoder/OffensiveSecurity/tree/main/CVES
Curated Windows binaries commonly useful during assessments and labs:
Custom-built offensive security tools for enumeration, credential validation, spraying, and privilege escalation.
- https://github.com/strikoder/CredSpray
- https://github.com/strikoder/NagoyaSpray
- https://github.com/strikoder/username-anarchy-extended
Common penetration testing and offensive security interview questions:
If this repository helped you during your OSCP journey, consider:
- ⭐ Starring the repository
- ❤️ Sponsoring the project on GitHub
- 🔁 Sharing it with others preparing for OSCP
Your support helps maintain open-source tooling, labs, notes, walkthroughs, and practical offensive security resources.