ChevalierOnGithub / OverflowyLinks
The tool was created to assist with fuzzing and exploiting stack-based buffer overflows
☆10Updated 5 years ago
Alternatives and similar repositories for Overflowy
Users that are interested in Overflowy are comparing it to the libraries listed below
Sorting:
- ☆33Updated 5 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 5 years ago
- OSWE Preparation☆38Updated 6 years ago
- ☆19Updated 4 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆26Updated last week
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- ☆14Updated 5 years ago
- Buffer Overflows☆28Updated 4 years ago
- Don't expect much :) Just expect to learn new things!☆64Updated 4 years ago
- ☆27Updated last year
- BurpSuite using the document and some extensions☆72Updated 5 years ago
- ☆67Updated 3 years ago
- Random Exploits☆50Updated 2 years ago
- Notes from OSCP, CTF, security adventures, etc...☆64Updated last year
- OSCP guide and Red Team assessment Guide☆37Updated 5 years ago
- Get GTFOBins info about a given exploit from the command line☆39Updated last year
- m0chan.github.io☆88Updated 4 months ago
- Reverse Shell-able Windows exploits short POCs.☆34Updated 5 years ago
- ☆38Updated 4 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array …☆56Updated 4 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Updated 2 years ago
- This tool provides commandline access for https://www.hackthebox.eu, https://tryhackme.com/ and https://www.vulnhub.com/ machines.☆41Updated 2 years ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆23Updated 6 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- ☆48Updated 4 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago