π» Elevate, UAC bypass, privilege escalation, dll hijack techniques
β11Nov 23, 2018Updated 7 years ago
Alternatives and similar repositories for WinPwnage
Users that are interested in WinPwnage are comparing it to the libraries listed below
Sorting:
- Custom pentesting toolsβ16Dec 11, 2019Updated 6 years ago
- Network Infrastructure Penetration Testing Toolβ15Oct 26, 2017Updated 8 years ago
- API with historical data for the Counter-Strike: 2 leaderboard, updated daily.β15Jan 27, 2025Updated last year
- Includes 5 Known Application Whitelisting/ Application Control Bypass Techniques in One File.β33Jul 7, 2016Updated 9 years ago
- Slide deck for DefCon Beijingβ39May 15, 2018Updated 7 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.β13Feb 28, 2026Updated 3 weeks ago
- My metasploit modulesβ11Jul 7, 2015Updated 10 years ago
- Windows DPAPI laboratoryβ12Mar 5, 2018Updated 8 years ago
- vulhubδΈθ½½ε¨οΌε―ειδΈθ½½ε―ΉεΊη―ε’β23Sep 19, 2018Updated 7 years ago
- A swiss army knife for pentesting Windows/Active Directory environmentsβ14May 29, 2018Updated 7 years ago
- Rust-based password mutator for brute force attacksβ13Mar 21, 2025Updated last year
- NMAP NSE that enumerates VNC authentication typesβ14Dec 21, 2010Updated 15 years ago
- Solving recaptcha using Puppeteer and OpenAI Whisper Modelβ13Jan 8, 2025Updated last year
- A collection of hacks and one-off scriptsβ11Apr 6, 2020Updated 5 years ago
- Metasploit Frameworkβ11Apr 18, 2019Updated 6 years ago
- Notes on Active Directory analysis and exploitationβ11Mar 7, 2019Updated 7 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.β13Dec 29, 2020Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration testsβ15Oct 14, 2018Updated 7 years ago
- A functional JS framework that values ββelegance, simplicity and minimalism.β13Sep 26, 2024Updated last year
- Process injection via KernelCallbackTableβ13Jan 28, 2022Updated 4 years ago
- Tutorials, tools, and more as related to reverse engineering video games.β15Dec 19, 2017Updated 8 years ago
- huawei mac2wepkey scannerβ19Jun 6, 2013Updated 12 years ago
- It contains malicious features that can steal files from BitRAT tools.β12Dec 19, 2021Updated 4 years ago
- E-mails, subdomains and names Harvester - OSINTβ13Feb 26, 2018Updated 8 years ago
- nmap nse script for web services screenshotβ16Jul 22, 2013Updated 12 years ago
- Misc resources for my daily pentesting...β19Mar 26, 2025Updated 11 months ago
- Information Repository on Various Methods of getting shell access into a Windows machineβ17Feb 11, 2020Updated 6 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in pβ¦β12Jan 10, 2020Updated 6 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)β14Aug 1, 2018Updated 7 years ago
- Generate images using your Cheshire cat and Stable Diffusion free API (Wizmodel.com API).β11Apr 27, 2025Updated 10 months ago
- PoC of BitcoinCore Denial-Of-Service and DoubleSpendingβ10Nov 12, 2018Updated 7 years ago
- A plugin for Counter-Strike 2 that fixes the rapid fire exploitβ11Oct 17, 2025Updated 5 months ago
- Docker + Docker-compose + Native + Selenium workspace to build any selenium appβ17Feb 11, 2025Updated last year
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.β21May 17, 2023Updated 2 years ago
- Detect data containing Personally Identifiable Information (PII) in Rβ15Jul 1, 2017Updated 8 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTFβ12May 21, 2024Updated last year
- Interview questions to screen offensive (red team/pentest) candidatesβ12Apr 7, 2017Updated 8 years ago
- nDPI Demoβ13Jan 14, 2017Updated 9 years ago
- β13Jun 26, 2021Updated 4 years ago