PinkP4nther / Shellcodes
I'll post my custom shellcode I make here!
☆22Updated 5 years ago
Alternatives and similar repositories for Shellcodes:
Users that are interested in Shellcodes are comparing it to the libraries listed below
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- CANAPE Network Testing Tool☆33Updated 6 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- ☆13Updated 7 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- List of Red Team Repositories☆17Updated 6 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆45Updated 4 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 10 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 7 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- Mimikatz HashClash☆12Updated 9 years ago
- Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆49Updated 6 years ago
- Snippets I used on exploit development, mostly broken.☆11Updated 7 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- ☆21Updated 8 years ago
- WhiteBox CMS analysis☆69Updated last year
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago