Used for the osce exam preparation
☆74Mar 3, 2016Updated 10 years ago
Alternatives and similar repositories for windows-exploits
Users that are interested in windows-exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some exploits, which I’ve created during my OSCE preparation.☆82Jul 7, 2018Updated 7 years ago
- Any code for preparing for OSCE☆12Oct 31, 2017Updated 8 years ago
- Collection of things made during my preparation to take on OSCE☆189Feb 24, 2022Updated 4 years ago
- ☆23Jan 22, 2017Updated 9 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Jul 7, 2017Updated 8 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- Mirror for exploit-exercises.com☆13Jan 3, 2019Updated 7 years ago
- Tools that I've created/used during CTP-OSCE☆10Jun 17, 2019Updated 6 years ago
- A large repository of links spanning all topics in information security.☆13Mar 18, 2016Updated 10 years ago
- One line PS scripts that may come handy during your network assesment☆80Mar 8, 2020Updated 6 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆210Oct 5, 2022Updated 3 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- A tool to password spray Jenkins instances☆60May 28, 2019Updated 6 years ago
- Proof of concept of VMSA-2017-0012☆41Jul 27, 2017Updated 8 years ago
- ☆13Nov 24, 2019Updated 6 years ago
- C# AV bypass jank☆35Feb 9, 2021Updated 5 years ago
- Various scripts for different malware families☆106Apr 12, 2021Updated 4 years ago
- Collection of things made during my preparation to take on OSEE☆102Jul 30, 2019Updated 6 years ago
- ☆16Mar 7, 2025Updated last year
- Challenges and vulnerabilities exploitation.☆60Dec 26, 2020Updated 5 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆59Mar 8, 2018Updated 8 years ago
- Windows Stagers to circumvent restrictive network environments☆69Sep 23, 2024Updated last year
- ☆24Nov 11, 2025Updated 4 months ago
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- ☆122Mar 6, 2018Updated 8 years ago
- Basic tutorials for reverse engineer with radare2☆60Mar 17, 2019Updated 7 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago
- Materials from Fuzzing Bay Area meetups☆68Dec 20, 2019Updated 6 years ago
- Linux AV tests☆13Apr 23, 2019Updated 6 years ago
- 👓 monitoring, alerting and threat analysis for ELK stack☆11Mar 27, 2017Updated 8 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago