Penetration testing with shellcode codes
☆28Jan 25, 2018Updated 8 years ago
Alternatives and similar repositories for pentest-with-shellcode
Users that are interested in pentest-with-shellcode are comparing it to the libraries listed below
Sorting:
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- Central IoC scanner based on Loki☆20Nov 12, 2021Updated 4 years ago
- Logs instruction hits to a file which can be fed into IDA Pro to highlight which instructions were called.☆42Jul 5, 2013Updated 12 years ago
- A fast binary coverage measurement tool based on AFL's Qemu mode☆34Jun 6, 2021Updated 4 years ago
- A Java version of the automatic program repair described by RSRepair and GenProg.☆11Jan 6, 2016Updated 10 years ago
- Penetration Testing with Shellcode, published by Packt☆36Oct 31, 2022Updated 3 years ago
- WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift☆33Nov 23, 2021Updated 4 years ago
- ☆37Jul 14, 2025Updated 7 months ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- A discord initiative tracker for playing PBP ttRPGs☆11Dec 30, 2024Updated last year
- node.js web scraper for roblox.com☆13Sep 17, 2014Updated 11 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- ☆11Dec 22, 2022Updated 3 years ago
- Troopers Conference Supporting Materials☆12Apr 8, 2015Updated 10 years ago
- Home of https://redteam.guide☆15Sep 19, 2022Updated 3 years ago
- Python emulator of msfconsole☆11Dec 28, 2019Updated 6 years ago
- DbgFlashVul☆12Sep 8, 2015Updated 10 years ago
- NO LONGER MAINTAINED. Read the README for more info.☆11May 20, 2018Updated 7 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- X32DBG QT5 parsing scripts☆11Sep 8, 2022Updated 3 years ago
- ☆11Mar 29, 2019Updated 6 years ago
- ☆10Apr 21, 2025Updated 10 months ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Hello World sample app with Ruby, Sinatra and DataMapper☆10Jan 19, 2023Updated 3 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 2 years ago
- This is a Sharp assembly loader in PowerShell☆13Oct 23, 2025Updated 4 months ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- Uma lista curada de recursos sobre a Lei Geral de Proteção de Dados☆11Jan 14, 2022Updated 4 years ago
- New Slack Emoji Notifications Built with Slack's Automation Platform☆15Dec 9, 2024Updated last year
- playing with gpt4☆14Mar 17, 2023Updated 2 years ago
- 作为博客☆11Apr 30, 2020Updated 5 years ago
- CDB-PIg is a plugin for cdb, but not windbg.☆11Nov 29, 2018Updated 7 years ago
- Spring4Shell (CVE-2022-22965)☆12Apr 7, 2022Updated 3 years ago
- My PoCs☆10Apr 5, 2020Updated 5 years ago
- fork old V8 source(tag: 1.2.14.20), make it works for MacOS with CMake, for study purpose☆12Mar 25, 2023Updated 2 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year