PinkP4nther / Shellcodes
I'll post my custom shellcode I make here!
☆22Updated 5 years ago
Alternatives and similar repositories for Shellcodes:
Users that are interested in Shellcodes are comparing it to the libraries listed below
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- put this here because archival reasons.☆28Updated 6 years ago
- A tool for fuzzing for ports that allow outgoing connections☆20Updated 6 years ago
- BlackHat Europe 2017 Slides☆26Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- Snippets I used on exploit development, mostly broken.☆11Updated 7 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 7 years ago
- Mimikatz HashClash☆12Updated 9 years ago
- CANAPE Network Testing Tool☆32Updated 6 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Updated 6 years ago
- IRC bot for cracking hashes☆18Updated 3 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Automated script to search in SMB protocol for availables pipe names☆22Updated 6 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Updated 4 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- List of Red Team Repositories☆17Updated 5 years ago
- ☆25Updated 3 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 6 years ago
- Post-exploitation scripts for OS X persistence and privesc☆72Updated 7 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- ☆25Updated 2 months ago
- Vulnerable Node.js Web Application to pratice with your pentesting skills☆21Updated 7 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Proof of Concept for CVE-2018-11776☆20Updated 6 years ago