EmreOvunc / Buffer-Overflow-PoCLinks
Examples of simple code patterns causing BOF
☆14Updated 5 years ago
Alternatives and similar repositories for Buffer-Overflow-PoC
Users that are interested in Buffer-Overflow-PoC are comparing it to the libraries listed below
Sorting:
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆90Updated 5 years ago
- A web shell for pivoting and lateral movement☆33Updated 7 years ago
- DO NOT RUN THIS.☆47Updated 4 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Updated 4 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- ☆18Updated 4 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Noob Penetration tester☆11Updated 3 months ago
- Finding SSL Blindspots for Red Teams☆33Updated 5 years ago
- Subdomain Enumeration and Scanner☆34Updated 5 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- ☆19Updated 5 years ago
- ☆54Updated 4 years ago
- automatic scan for hackthebox☆13Updated 5 years ago
- Execute Mimikatz with different technique☆51Updated 3 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 5 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆48Updated 2 years ago
- Stealthy Stand Alone PHP Web Shell☆33Updated 6 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆81Updated 4 years ago
- A tool to password spray Jenkins instances☆57Updated 6 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆17Updated 4 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago