PinkP4nther / ShellcodesLinks
I'll post my custom shellcode I make here!
☆22Updated 5 years ago
Alternatives and similar repositories for Shellcodes
Users that are interested in Shellcodes are comparing it to the libraries listed below
Sorting:
- ☆122Updated 7 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 8 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- ☆22Updated 8 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- List of Red Team Repositories☆17Updated 6 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- ☆13Updated 8 years ago
- Hacking challenges☆31Updated 7 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- intentionally vulnerable API☆30Updated last year
- Issues to consider when planning a red team exercise.☆15Updated 8 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50Updated 7 years ago
- A fileless Windows keylogger that exfils via DNS.☆33Updated 8 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago