π» Elevate, UAC bypass, privilege escalation, dll hijack techniques
β11Nov 23, 2018Updated 7 years ago
Alternatives and similar repositories for WinPwnage
Users that are interested in WinPwnage are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Custom pentesting toolsβ16Dec 11, 2019Updated 6 years ago
- Network Infrastructure Penetration Testing Toolβ15Oct 26, 2017Updated 8 years ago
- API with historical data for the Counter-Strike: 2 leaderboard, updated daily.β15Jan 27, 2025Updated last year
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.β33Jul 7, 2016Updated 9 years ago
- Slide deck for DefCon Beijingβ39May 15, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer β’ AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.β13Feb 28, 2026Updated 2 months ago
- My metasploit modulesβ11Jul 7, 2015Updated 10 years ago
- Windows DPAPI laboratoryβ12Mar 5, 2018Updated 8 years ago
- Modifies running processes on Linuxβ26Jun 26, 2022Updated 3 years ago
- vulhubδΈθ½½ε¨οΌε―ειδΈθ½½ε―ΉεΊη―ε’β23Sep 19, 2018Updated 7 years ago
- A swiss army knife for pentesting Windows/Active Directory environmentsβ14May 29, 2018Updated 7 years ago
- Rust-based password mutator for brute force attacksβ13Mar 21, 2025Updated last year
- NMAP NSE that enumerates VNC authentication typesβ14Dec 21, 2010Updated 15 years ago
- Solving recaptcha using Puppeteer and OpenAI Whisper Modelβ13Jan 8, 2025Updated last year
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A collection of hacks and one-off scriptsβ11Apr 6, 2020Updated 6 years ago
- Metasploit Frameworkβ11Apr 18, 2019Updated 7 years ago
- Notes on Active Directory analysis and exploitationβ11Mar 7, 2019Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration testsβ15Oct 14, 2018Updated 7 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.β13Dec 29, 2020Updated 5 years ago
- A functional JS framework that values ββelegance, simplicity and minimalism.β13Sep 26, 2024Updated last year
- Process injection via KernelCallbackTableβ13Jan 28, 2022Updated 4 years ago
- Tutorials, tools, and more as related to reverse engineering video games.β15Dec 19, 2017Updated 8 years ago
- huawei mac2wepkey scannerβ19Jun 6, 2013Updated 12 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer β’ AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- nmap nse script for web services screenshotβ16Jul 22, 2013Updated 12 years ago
- Misc resources for my daily pentesting...β19Mar 26, 2025Updated last year
- Information Repository on Various Methods of getting shell access into a Windows machineβ17Feb 11, 2020Updated 6 years ago
- It contains malicious features that can steal files from BitRAT tools.β12Dec 19, 2021Updated 4 years ago
- E-mails, subdomains and names Harvester - OSINTβ13Feb 26, 2018Updated 8 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in pβ¦β12Jan 10, 2020Updated 6 years ago
- Generate images using your Cheshire cat and Stable Diffusion free API (Wizmodel.com API).β11Apr 27, 2025Updated last year
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)β14Aug 1, 2018Updated 7 years ago
- A plugin for Counter-Strike 2 that fixes the rapid fire exploitβ11Oct 17, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer β’ AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Docker + Docker-compose + Native + Selenium workspace to build any selenium appβ17Feb 11, 2025Updated last year
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.β21May 17, 2023Updated 2 years ago
- Detect data containing Personally Identifiable Information (PII) in Rβ15Jul 1, 2017Updated 8 years ago
- Proof of Concept for CVE-2018-11776β21Sep 12, 2018Updated 7 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ12May 21, 2024Updated last year
- Interview questions to screen offensive (red team/pentest) candidatesβ12Apr 7, 2017Updated 9 years ago
- nDPI Demoβ13Jan 14, 2017Updated 9 years ago