Vulnerable Windows Application
☆18Nov 27, 2023Updated 2 years ago
Alternatives and similar repositories for Vulnerable-Windows-Application
Users that are interested in Vulnerable-Windows-Application are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Master Thick Client Penetration Testing: Explore practical methodologies, uncover vulnerabilities, and enhance security.☆20Apr 6, 2024Updated 2 years ago
- A collection of skills, agents, commands, and workflows for security researchers. Compatible with Claude Code, Claude Desktop, OpenCode, …☆37Feb 25, 2026Updated last month
- ☆16Dec 16, 2021Updated 4 years ago
- A repo to store public scan data for my bug bounty hunting framework.☆23Dec 26, 2025Updated 3 months ago
- A kernel driver to get a Handle to virtually *every* process☆13Jan 16, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Structured, Literate Emacs configuration framework☆25Feb 18, 2026Updated last month
- ☆18Nov 25, 2025Updated 4 months ago
- ☆11Feb 7, 2023Updated 3 years ago
- A python tool to generate an Excel file linking the list of cracked accounts and their LDAP attributes.☆12Jan 31, 2025Updated last year
- ☆57Dec 20, 2018Updated 7 years ago
- ☆14Jul 26, 2025Updated 8 months ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆105Jan 9, 2024Updated 2 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- Easy recon tool for OSCP and HTB☆10Aug 8, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A node utility to scan a domain with various techniques.☆12Sep 10, 2020Updated 5 years ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- The Hunt for Malicious Strings☆13Oct 8, 2020Updated 5 years ago
- Damn Vulnerable ElectronJS App (DVEA)☆17Feb 12, 2026Updated 2 months ago
- Poc script for ProxyShell exploit chain in Exchange Server☆24Feb 24, 2022Updated 4 years ago
- WS-Attacker is a modular framework for web services Security penetration testing.☆12May 16, 2019Updated 6 years ago
- this tutorial contain a simple explanation for FreeRTOS using neculo-32f303RE☆10Feb 13, 2023Updated 3 years ago
- Windows x64 Exploitation Training☆16May 30, 2025Updated 10 months ago
- A OWASP Based Checklist With 80+ Test Cases☆169Oct 26, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- SquidClient. HTB Unbalanced edition.☆10Aug 8, 2020Updated 5 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆119Apr 15, 2022Updated 3 years ago
- Bypassing AWS WAF using a single ';'☆40Aug 1, 2018Updated 7 years ago
- ☆15Nov 27, 2017Updated 8 years ago
- this my repo with notes i take in penetration testing☆29Feb 14, 2026Updated last month
- Workshop & Talk Slide Decks from HackSpaceCon☆26Dec 14, 2025Updated 4 months ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- ☆11Apr 21, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Detect and bypass Istio sidecar☆21Sep 24, 2021Updated 4 years ago
- This Burp extension helps you to find usages of postMessage and recvMessage☆14Feb 20, 2020Updated 6 years ago
- Bypass AMSI via PowerShell by splitting a file into multiple chunks☆53Jul 22, 2021Updated 4 years ago
- A script used to query the dehashed API and filter for more useful results☆16Jun 20, 2021Updated 4 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Aug 11, 2022Updated 3 years ago
- Artifacts for the WOOT publication.☆18Oct 3, 2020Updated 5 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆21Mar 4, 2022Updated 4 years ago