This repository contain all virtual vulnerable machine. These vulnerable machine are Window and Linux based.
☆128Jun 30, 2019Updated 6 years ago
Alternatives and similar repositories for Vulnerable_Machine
Users that are interested in Vulnerable_Machine are comparing it to the libraries listed below
Sorting:
- Network Pivoting Toolkit☆457Aug 26, 2023Updated 2 years ago
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 7 years ago
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆22Jun 13, 2023Updated 2 years ago
- A list of the books that I am reading, with priorities.☆35May 1, 2022Updated 3 years ago
- this nuclei template finds back up files☆22Aug 25, 2025Updated 6 months ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆27Nov 11, 2022Updated 3 years ago
- A PDF that shows its own MD5☆11Jan 2, 2023Updated 3 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- Fork of QEMU with Virtual Machine Introspection patches☆14Sep 13, 2023Updated 2 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Spring Cloud Gateway Actuator API SpEL Code Injection (CVE-2022-22947)☆11Apr 15, 2022Updated 3 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- repository to hold prebuilt kali nethunter kernel☆17Nov 22, 2021Updated 4 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆15Apr 8, 2025Updated 10 months ago
- ☆13Sep 8, 2024Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆52Jul 15, 2023Updated 2 years ago
- ☆31Sep 23, 2022Updated 3 years ago
- ☆14Dec 28, 2020Updated 5 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- English subtitles for the TV series "Hackad"☆11May 18, 2023Updated 2 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- A script that parses PowerView's output for GPO analysis. Integrated into bloodhound to find misconfigurations of URA, SMB signing etc☆15Feb 9, 2020Updated 6 years ago
- Tous les trucs utilisés dans les Tutos, les shellcodes, les templates, les notes...☆14Jan 15, 2024Updated 2 years ago
- Here you can find video, slides and other stuff related to RomHack Conference since the beginning (2018). Enjoy!☆18Nov 26, 2025Updated 3 months ago
- Our team's CTF writeups☆12Jan 15, 2020Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆2,050Oct 9, 2022Updated 3 years ago
- ☆33Feb 27, 2024Updated 2 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57May 1, 2022Updated 3 years ago
- ☆99Sep 20, 2021Updated 4 years ago