SaltwaterC / sploit-tools
My own tools for easing the task of pentesting / exploit writing
☆49Updated 10 years ago
Alternatives and similar repositories for sploit-tools
Users that are interested in sploit-tools are comparing it to the libraries listed below
Sorting:
- Hacking challenges☆31Updated 7 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- ☆34Updated 8 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆52Updated 10 years ago
- Slides from previous conference talks☆41Updated 8 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Updated 11 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 8 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Exploit collection for NT privilege escalation☆65Updated 9 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- ☆74Updated 2 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆59Updated 8 years ago
- Operational toolset utilizing git's submodule feature☆57Updated 12 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- CTF Wiki - http://ctf.forgottensec.com/wiki/index.php☆45Updated 7 years ago
- Published vulnerabilities and exploits.☆56Updated 2 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- Projects and POCs☆60Updated 10 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago