EmreOvunc / Buffer-Overflow-PoCLinks
Examples of simple code patterns causing BOF
☆14Updated 5 years ago
Alternatives and similar repositories for Buffer-Overflow-PoC
Users that are interested in Buffer-Overflow-PoC are comparing it to the libraries listed below
Sorting:
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Updated 4 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆90Updated 5 years ago
- Advanced Recon Tool☆26Updated 5 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆41Updated 5 years ago
- Noob Penetration tester☆11Updated 4 months ago
- Kubernetes Scanner☆40Updated 3 years ago
- DO NOT RUN THIS.☆47Updated 4 years ago
- ☆47Updated 4 years ago
- ☆36Updated 10 months ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆82Updated 4 years ago
- Stealthy Stand Alone PHP Web Shell☆33Updated 6 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Subdomain Enumeration and Scanner☆34Updated 5 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆28Updated 2 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Updated 2 years ago
- Unique wordlist generator of unique wordlists.☆42Updated 2 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- automatic scan for hackthebox☆13Updated 5 years ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Magento Security Scanner☆13Updated 3 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Updated 5 years ago
- Nmap script to check vulnerability CVE-2021-21975☆28Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Updated 2 years ago