Practical OSCP preparation resources, tooling, notes, walkthrough references, and reporting setup.
OSCP review, preparation strategy, methodology, lessons learned, and exam experience:
- YouTube (long version): https://www.youtube.com/watch?v=9HFKfGs6ym8
- Medium (short text version): https://medium.com/@strikoder/strikoder-oscp-review-47f9f6efb25e
Browse OSCP-related notes, commands, techniques, walkthrough references, and searchable machine resources:
Tip: Use the tags on https://strikoder.com/oscp to search by topic, then cross-check the techniques, commands, and methodology with the machines listed in Strilist - OSCP to see practical usage examples on specific targets.
Video walkthrough:
https://youtu.be/dT7XgN8uuSU
To install and run the setup script in one command:
bash <(curl -fsSL https://raw.githubusercontent.com/strikoder/OSCP-Prep/main/Report/sysreptor_setup.sh)Note: The watermark may appear at the front of code blocks, which can affect reproducibility when submitting the report.
To remove it, go to:
Design → OSCP → PDF DesignerThen delete:
<div v-if="report.watermark" id="watermark-osid">{{ report.osid }}</div>
Public exploit references, PoCs, and vulnerability research collections:
- https://github.com/stars/strikoder/lists/cve-poc-implementations
- https://github.com/strikoder/OffensiveSecurity/tree/main/CVES
Curated Windows binaries commonly useful during assessments and labs:
Collection of Active Directory enumeration scripts and recon helpers:
Custom-built offensive security tools for enumeration, credential validation, spraying, and privilege escalation.
- https://github.com/strikoder/CredSpray
- https://github.com/strikoder/NagoyaSpray
- https://github.com/strikoder/username-anarchy-extended
Common penetration testing and offensive security interview questions:
If this project helps you, consider supporting my work:
If this repository helped you during your OSCP journey, consider:
- ⭐ Starring the repository
- ❤️ Sponsoring the project on GitHub
- 🔁 Sharing it with others preparing for OSCP
Your support helps maintain open-source tooling, labs, notes, walkthroughs, and practical offensive security resources.
👉 https://github.com/sponsors/strikoder