Offsec Notes — Sources

Provenance pages for the Offensive Security Notes ingest. The source wiki distinguishes already-distilled material (under sources/ingested/) from pending raw references at the root of sources/. The catalogued group is largely Maldev Academy course material (third-party, not republished) — these pages carry titles + excerpts only, with full text remaining in the raw store.

Total catalogued: 83 files (integrated: 36, catalogued: 47)


Integrated (36)

SourceFile
Abusing Windows Built in VPN ProvidersAbusing Windows Built-in VPN Providers.md
Accelerating Offensive R&D with LLMsAccelerating Offensive R&D with LLMs.md
AirSnitch: Demystifying and BreakingAirSnitch - Demystifying and Breaking.md
AppLocker Rules AbuseAppLocker Rules Abuse.md
Async BOFs Wake Me Up, Before You Go Go Async BOFs - _Wake Me Up, Before You Go Go_.md
Attacking JWT using X509 CertificatesAttacking JWT using X509 Certificates.md
Bind Link – EDR TamperingBind Link – EDR Tampering.md
BOF Linting for Accelerated DevelopmentBOF Linting for Accelerated Development.md
Command Line Underdog WMIC in ActionCommand Line Underdog_ WMIC in Action.md
Common Mobile Device Threat VectorsCommon Mobile Device Threat Vectors.md
Credential GuardCredential Guard.md
CVE 2025 1729 Privilege Escalation Using TPQMAssistant.exeCVE-2025-1729 - Privilege Escalation Using TPQMAssistant.exe.md
Detecting Active Directory Password Spraying with a Honeypot AccountDetecting Active Directory Password-Spraying with a Honeypot Account.md
Dragging Secrets Out of Chrome NTLM Hash Leaks via File URLsDragging Secrets Out of Chrome_ NTLM Hash Leaks via File URLs.md
EDR SilencingEDR Silencing.md
GAC HijackingGAC Hijacking.md
Hack cessibility When DLL Hijacks Meet Windows HelpersHack-cessibility_ When DLL Hijacks Meet Windows Helpers.md
Helpful Hints for Writing (and Editing) Cybersecurity ReportsHelpful Hints for Writing (and Editing) Cybersecurity Reports.md
Hunting Deserialization Vulnerabilities With ClaudeHunting Deserialization Vulnerabilities With Claude.md
Keys to JWT Assessments From a Cheat Sheet to a Deep DiveKeys to JWT Assessments - From a Cheat Sheet to a Deep Dive.md
Kubernetes for Pentesters Part 1Kubernetes for Pentesters_ Part 1.md
Linux Process Injection via Seccomp NotifyLinux Process Injection via Seccomp Notify.md
LnkMeMaybe A Review of CVE 2026 25185LnkMeMaybe - A Review of CVE-2026-25185.md
LSASS Dump – Windows Error ReportingLSASS Dump – Windows Error Reporting.md
macOS JIT MemorymacOS JIT Memory.md
MCP An Introduction to Agentic Op SupportMCP_ An Introduction to Agentic Op Support.md
Microsoft SpeechMicrosoft Speech.md
Notepad++ Plugins Plug and PayloadNotepad++ Plugins_ Plug and Payload.md
Operating Inside the Interpreted Offensive PythonOperating Inside the Interpreted_ Offensive Python.md
PatchGuard Peekaboo Hiding Processes on Systems with PatchGuard in 2026PatchGuard Peekaboo_ Hiding Processes on Systems with PatchGuard in 2026.md
Purpling Your OpsPurpling Your Ops.md
Red Team Gold Extracting Credentials from MDT SharesRed Team Gold_ Extracting Credentials from MDT Shares.md
There’s More than One Way to Trigger a Windows ServiceThere's More than One Way to Trigger a Windows Service.md
Toast NotificationsToast Notifications.md
Training Specialist ModelsTraining Specialist Models.md
WSUS Is SUS NTLM Relay Attacks in Plain SightWSUS Is SUS_ NTLM Relay Attacks in Plain Sight.md

Catalogued (47)

SourceFile
APC InjectionAPC Injection.md
Callback Code ExecutionCallback Code Execution.md
Coding BasicsCoding Basics.md
Detection MechanismsDetection Mechanisms.md
Dynamic Link LibraryDynamic-Link Library.md
Early Bird APC InjectionEarly Bird APC Injection.md
Evading Microsoft Defender Static AnalysisEvading Microsoft Defender Static Analysis.md
Introduction To Payload EncryptionIntroduction To Payload Encryption.md
Introduction To The Windows APIIntroduction To The Windows API.md
Local Function Stomping InjectionLocal Function Stomping Injection.md
Local Mapping InjectionLocal Mapping Injection.md
Local Payload ExecutionLocal Payload Execution.md
Local Payload Execution (1)Local Payload Execution (1).md
Maldev Academy ToolMaldev Academy Tool.md
Maldev Academy Tool (1)Maldev Academy Tool (1).md
Malware Binary SigningMalware Binary Signing.md
Payload EncryptionPayload Encryption.md
Payload Encryption AES EncryptionPayload Encryption - AES Encryption.md
Payload Encryption (1)Payload Encryption (1).md
Payload Execution ControlPayload Execution Control.md
Payload ObfuscationPayload Obfuscation.md
Payload Obfuscation (1)Payload Obfuscation (1).md
Payload Obfuscation (2)Payload Obfuscation (2).md
Payload Placement .data & .rdata SectionsPayload Placement - .data & .rdata Sections.md
Payload Placement .rsrc SectionPayload Placement - .rsrc Section.md
Payload Placement .text SectionPayload Placement - .text Section.md
Payload Staging Web ServerPayload Staging - Web Server.md
Payload Staging Windows RegistryPayload Staging - Windows Registry.md
Portable Executable FormatPortable Executable Format.md
Process Argument Spoofing (1)Process Argument Spoofing (1).md
Process Argument Spoofing (2)Process Argument Spoofing (2).md
Process EnumerationProcess Enumeration.md
Process Enumeration (1)Process Enumeration (1).md
Process Injection DLL InjectionProcess Injection - DLL Injection.md
Process Injection Shellcode InjectionProcess Injection - Shellcode Injection.md
Remote Function Stomping InjectionRemote Function Stomping Injection.md
Remote Mapping InjectionRemote Mapping Injection.md
Required ToolsRequired Tools.md
Spoofing PPIDSpoofing PPID.md
Thread Hijacking Local Thread CreationThread Hijacking - Local Thread Creation.md
Thread Hijacking Local Thread EnumerationThread Hijacking - Local Thread Enumeration.md
Thread Hijacking Remote Thread CreationThread Hijacking - Remote Thread Creation.md
Thread Hijacking Remote Thread EnumerationThread Hijacking - Remote Thread Enumeration.md
Undocumented StructuresUndocumented Structures.md
Windows ArchitectureWindows Architecture.md
Windows Memory ManagementWindows Memory Management.md
Windows ProcessesWindows Processes.md