Used for the osce exam preparation
☆74Mar 3, 2016Updated 10 years ago
Alternatives and similar repositories for windows-exploits
Users that are interested in windows-exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some exploits, which I’ve created during my OSCE preparation.☆82Jul 7, 2018Updated 7 years ago
- Any code for preparing for OSCE☆12Oct 31, 2017Updated 8 years ago
- Collection of things made during my preparation to take on OSCE☆189Feb 24, 2022Updated 4 years ago
- ☆23Jan 22, 2017Updated 9 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Jul 7, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 10 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 3 years ago
- Part 2 of our Stack Based Buffer Overflow series. Building the ROP chain.☆14Jan 28, 2022Updated 4 years ago
- Mirror for exploit-exercises.com☆13Jan 3, 2019Updated 7 years ago
- Tools that I've created/used during CTP-OSCE☆10Jun 17, 2019Updated 6 years ago
- A large repository of links spanning all topics in information security.☆13Mar 18, 2016Updated 10 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- OSEE Preparation☆191Feb 15, 2019Updated 7 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Sep 9, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆210Oct 5, 2022Updated 3 years ago
- BlackHat Europe 2017 Slides☆25Feb 15, 2018Updated 8 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- burp 插件 用于RSA 数据包加解密☆28Feb 25, 2016Updated 10 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- Proof of concept of VMSA-2017-0012☆41Jul 27, 2017Updated 8 years ago
- ☆13Nov 24, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Asus AsIO2 Local Privilege Escalation exploit (based on ReWolf's MSI exploit)☆14Apr 5, 2020Updated 6 years ago
- C# AV bypass jank☆35Feb 9, 2021Updated 5 years ago
- Various scripts for different malware families☆106Apr 12, 2021Updated 5 years ago
- Collection of things made during my preparation to take on OSEE☆102Jul 30, 2019Updated 6 years ago
- Open-source methodology on pentesting and risk mitigation☆14Oct 20, 2020Updated 5 years ago
- Challenges and vulnerabilities exploitation.☆60Dec 26, 2020Updated 5 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- Simple Polymorphic x86_64 Runtime Code Segment Cryptor☆59Mar 8, 2018Updated 8 years ago
- Struts2全漏洞扫描利用工具☆22Jun 16, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Windows Stagers to circumvent restrictive network environments☆69Sep 23, 2024Updated last year
- ☆24Nov 11, 2025Updated 5 months ago
- View Linux perf traces in IDA Pro☆15Nov 18, 2019Updated 6 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- ☆122Mar 6, 2018Updated 8 years ago
- python 抓取最新的cve漏洞url地址☆10Apr 16, 2018Updated 7 years ago
- Parsers for custom malware formats ("Funky malware formats")☆98Jan 8, 2022Updated 4 years ago