Hamza-Megahed / pentest-with-shellcodeLinks
Penetration testing with shellcode codes
☆28Updated 7 years ago
Alternatives and similar repositories for pentest-with-shellcode
Users that are interested in pentest-with-shellcode are comparing it to the libraries listed below
Sorting:
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Updated 4 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 11 months ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- Noob Penetration tester☆11Updated last year
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- A XPath injection demonstration application☆22Updated 4 years ago
- ☆1Updated 6 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Updated 9 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆66Updated 3 months ago
- Exploit for PlaySMS 1.4 authenticated RCE☆14Updated 6 years ago
- ☆23Updated 4 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆25Updated 4 years ago
- DO NOT RUN THIS.☆47Updated 3 years ago
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆77Updated 5 years ago
- ☆50Updated 4 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- A tool for creating proxy dll for hijacking☆42Updated 7 months ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 6 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆20Updated 4 years ago
- A tool to password spray Jenkins instances☆57Updated 6 years ago
- Scripts for OSCE☆18Updated 6 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago