SaltwaterC / sploit-toolsLinks
My own tools for easing the task of pentesting / exploit writing
☆49Updated 11 years ago
Alternatives and similar repositories for sploit-tools
Users that are interested in sploit-tools are comparing it to the libraries listed below
Sorting:
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆25Updated 8 years ago
- Created by Jeffrey Martin via the GitHub Connector☆50Updated 11 months ago
- Published vulnerabilities and exploits.☆57Updated 2 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆54Updated 11 years ago
- Spray SMB with hashes, Then psexec☆32Updated 6 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80Updated 8 years ago
- Slides from previous conference talks☆41Updated 8 years ago
- ☆23Updated 9 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 11 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 3 years ago
- Pentest Scripts for Apache Vulnerabilities☆30Updated 8 years ago
- some pocs for antivirus evasion☆131Updated 2 years ago
- PHDAYS |||☆17Updated 12 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 10 years ago
- A rudimentary remote desktop tool for the X11 protocol exploiting unauthenticated x11 sessions☆82Updated 8 years ago
- Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049☆51Updated 8 years ago
- VBA Reversed TCP Meterpreter Stager☆65Updated 7 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138Updated 8 years ago
- BurpSuite Pro Python Extension☆18Updated 12 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Platform independent peCloak fork based on Capstone☆107Updated 9 years ago
- public exploits☆35Updated 2 years ago
- Splunk Web Shell☆51Updated 10 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- BlackHat Europe 2017 Slides☆25Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- unix wildcard attacks☆137Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago