EmreOvunc / Buffer-Overflow-PoCLinks
Examples of simple code patterns causing BOF
☆15Updated 5 years ago
Alternatives and similar repositories for Buffer-Overflow-PoC
Users that are interested in Buffer-Overflow-PoC are comparing it to the libraries listed below
Sorting:
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91Updated 5 years ago
- Stealthy Stand Alone PHP Web Shell☆33Updated 5 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆27Updated last year
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆41Updated 4 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆81Updated 4 years ago
- DO NOT RUN THIS.☆47Updated 3 years ago
- ☆36Updated 6 months ago
- Kubernetes Scanner☆40Updated 3 years ago
- Local File Inclusion Burp-Suite Intruder Payload Generator Plugin☆40Updated 4 years ago
- ☆19Updated 4 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- A web shell for pivoting and lateral movement☆34Updated 7 years ago
- Data exfiltration utility for testing detection capabilities☆58Updated 3 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 5 years ago
- Noob Penetration tester☆11Updated 3 weeks ago
- Unique wordlist generator of unique wordlists.☆42Updated 2 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆19Updated 5 years ago
- Nmap script to check vulnerability CVE-2021-21975☆28Updated 4 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 4 years ago
- ☆54Updated 4 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆44Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- Finding SSL Blindspots for Red Teams☆32Updated 5 years ago
- This script helps to identify CVE-2021-26855 ssrf Poc☆23Updated 4 years ago
- rcracki_mt : used to perform a rainbow table attack on password hashes☆13Updated 9 years ago
- A tool to password spray Jenkins instances☆57Updated 6 years ago
- Nmap script to check vulnerability CVE-2021-21972☆28Updated 4 years ago