Windows Exploit List
☆17Jun 13, 2019Updated 6 years ago
Alternatives and similar repositories for WindowsExploits
Users that are interested in WindowsExploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TLS Examples in Schannel and IO Completion Ports☆10Jun 21, 2022Updated 3 years ago
- A collaborative, multi-platform, red teaming framework☆13Jan 19, 2020Updated 6 years ago
- using gpuz to load driver☆36Mar 14, 2019Updated 7 years ago
- A introductory workshop to getting started with fuzzing using american fuzzy lop (AFL)☆23Oct 10, 2019Updated 6 years ago
- Fuzzing v8 with dharma and libfuzzer☆13Jan 28, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Windbg extension port for rp++ is a fast C++ ROP gadget finder for PE/ELF/Mach-O x86/x64/ARM/ARM64 binaries.☆13Sep 8, 2023Updated 2 years ago
- Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code.☆19Jan 3, 2017Updated 9 years ago
- A very powerful tool for All kind of MITM attacks☆15Sep 7, 2023Updated 2 years ago
- Hiding the window from screenshots using the function win32kfull::ChangeWindowTreeProtection☆11Jan 3, 2022Updated 4 years ago
- This Repository is for random Knicks and knacks - in relation to PowerShell scripts I have created for one task or another.☆16Jan 13, 2025Updated last year
- ☆21Jul 27, 2020Updated 5 years ago
- Exfiltrate data from a compromised target using covert channels☆17Mar 20, 2021Updated 5 years ago
- Gallery plugin for October CMS based on Magnific Popup☆11Apr 30, 2025Updated 11 months ago
- Rust port of kdmapper☆22Aug 24, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Windows C++ Implant for Exploration C2☆45Jan 26, 2026Updated 2 months ago
- IFL - Interactive Functions List (plugin for Binary Ninja)☆25Jul 9, 2024Updated last year
- Foxit Image Converter Fuzzing Harness☆17Jun 11, 2020Updated 5 years ago
- ☆21May 9, 2025Updated 11 months ago
- 爬取cve/metasplot/exploit-db数据,构建“产品--cve--exp”查询链。☆18Dec 8, 2018Updated 7 years ago
- The project collects the gadgets and records the time to obtain gadgets from a process by utilizing an attack technique called Just-In-Ti…☆20Apr 30, 2022Updated 3 years ago
- Code used in a short tutorial on LLVM passes for the Software Reliablity Group (SRG) at Imperial☆19Apr 26, 2015Updated 10 years ago
- Jsp Decoder Source Code☆16Mar 23, 2021Updated 5 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Bluefrost Exploitation Challenge 2019 - Exploit and Writeup☆25Feb 11, 2024Updated 2 years ago
- A list of data-only attacks☆21Aug 22, 2025Updated 7 months ago
- ezleague is a PHP Online Gaming League script☆10Apr 16, 2014Updated 11 years ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago
- Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents☆23Jan 10, 2017Updated 9 years ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 3 years ago
- Process Hollowing Packer☆29Sep 5, 2017Updated 8 years ago
- A simple powershell script which gives handy compliance report.☆19Nov 27, 2017Updated 8 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆22Feb 5, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Aug 17, 2021Updated 4 years ago
- (Yet another) comical and extensible chat bot.☆10Dec 14, 2022Updated 3 years ago
- ☆142May 22, 2024Updated last year
- A VMBR (Virtual-Machine Based Rootkit) which runs a guest OS and sends the attacker its data☆28Apr 27, 2024Updated last year
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- A tool for creating and editing SHADERed UI themes.☆14Oct 13, 2020Updated 5 years ago