PinkDraconian / PwnZeroToHero-0x05-labs
☆9Updated 3 years ago
Alternatives and similar repositories for PwnZeroToHero-0x05-labs:
Users that are interested in PwnZeroToHero-0x05-labs are comparing it to the libraries listed below
- Script to chain search parameters for MalwareBazaar☆11Updated 2 months ago
- self-hosted Azure OSINT tool☆30Updated 7 months ago
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Updated 4 months ago
- VM Lab for security☆9Updated last year
- One line command and control backdoors for APIs and web applications.☆50Updated last year
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆11Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆12Updated 10 months ago
- ☆27Updated 4 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆23Updated 10 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆13Updated 4 months ago
- ☆10Updated 4 months ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- Malware Analysis tools☆26Updated 7 months ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Monitor your target continuously for new subdomains!☆26Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆25Updated 9 months ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Ant is a post-exploitation tool designed to automate the deployment of tunnels and port forwarding based on a predefined topology configu…☆14Updated last year
- Repo for all my exploits/PoCs☆50Updated 2 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆31Updated last year
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Updated last year
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆60Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- ☆18Updated 6 months ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆18Updated 8 months ago
- Make an Linux Kernel rootkit visible again.☆50Updated last month
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆19Updated 10 months ago
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆27Updated 3 months ago