PinkP4nther / ShellcodesLinks
I'll post my custom shellcode I make here!
☆22Updated 6 years ago
Alternatives and similar repositories for Shellcodes
Users that are interested in Shellcodes are comparing it to the libraries listed below
Sorting:
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- ☆122Updated 7 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago
- Plaintext Password harvesting from Azure Windows VMs☆68Updated 7 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 7 years ago
- Material from our CANAPE workshop☆32Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Updated 7 years ago
- ☆13Updated 8 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 5 years ago
- Simple DDE object detector☆56Updated 8 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 11 years ago
- ☆23Updated 9 years ago
- BlackHat Europe 2017 Slides☆25Updated 7 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- intentionally vulnerable API☆30Updated last year
- A tool to help you manage your leaks☆34Updated 8 years ago
- A Pythonic wrapper to MassDNS☆24Updated 7 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆25Updated 8 years ago
- A fileless Windows keylogger that exfils via DNS.☆33Updated 8 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- Linux Local Privesc Helper and Agent☆166Updated 6 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- ☆101Updated 4 years ago
- Extreme Vulnerable Node Application☆95Updated 7 years ago
- Hacking challenges☆31Updated 8 years ago
- VBA Reversed TCP Meterpreter Stager☆65Updated 7 years ago