Anon-Exploiter / BOFLinks
Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!
☆19Updated 5 years ago
Alternatives and similar repositories for BOF
Users that are interested in BOF are comparing it to the libraries listed below
Sorting:
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Updated 6 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆41Updated 5 years ago
- ☆19Updated 4 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆25Updated last week
- ☆14Updated 5 years ago
- Offensive Security Wireless Professional☆17Updated 5 years ago
- OSWE Preparation☆38Updated 6 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 6 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- ☆32Updated 5 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 6 years ago
- ☆27Updated last year
- OSCP guide and Red Team assessment Guide☆37Updated 5 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 5 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- Empower your enumeration during OSCP☆36Updated 7 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆57Updated 5 years ago
- Penetration Testing with Kali Linux☆22Updated 6 years ago
- ☆73Updated 7 years ago
- Another Subdomain ENumeration Tool☆13Updated 3 years ago
- ☆29Updated 6 years ago
- ☆24Updated 6 years ago
- autocrack adds queue support for hashcat cracking.☆40Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Updated 6 years ago
- ☆19Updated 6 years ago
- Noob Penetration tester☆11Updated 5 months ago
- Command Execution exploiter with an auto connection handling☆32Updated 3 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago