OWASP / ZSC
OWASP ZSC - Shellcode/Obfuscate Code Generator https://www.secologist.com/
☆644Updated 6 months ago
Related projects: ⓘ
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆721Updated 6 years ago
- Micro$oft Windows Hacking Pack☆512Updated 6 years ago
- Vulnerability Labs for security analysis☆1,153Updated 3 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆956Updated 6 years ago
- AntiVirus Evasion Tool☆1,637Updated 11 months ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆732Updated 5 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,199Updated 4 years ago
- application server attack toolkit☆681Updated 4 years ago
- ☆710Updated this week
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,095Updated 6 years ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,281Updated 3 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆485Updated 3 years ago
- ☆2,037Updated this week
- PwnWiki - The notes section of the pentesters mind.☆552Updated 5 years ago
- Malware exploits☆533Updated 5 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆817Updated 6 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆548Updated 9 years ago
- A shellcode writing toolkit☆659Updated 2 years ago
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆446Updated last year
- Modern tactical exploitation toolkit.☆788Updated 2 months ago
- Payload development framework☆556Updated 3 weeks ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆519Updated 7 years ago
- Post Exploitation Wiki☆507Updated 4 years ago
- ☆393Updated this week
- kernel privilege escalation enumeration and exploitation framework☆686Updated 6 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,046Updated 4 years ago
- The Damn Vulnerable Router Firmware Project☆667Updated 3 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆511Updated 4 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆943Updated 5 years ago
- Post Exploitation Collection☆1,552Updated 4 years ago