SecWiki / windows-kernel-exploits
windows-kernel-exploits Windows平台提权漏洞集合
☆8,174Updated 3 years ago
Alternatives and similar repositories for windows-kernel-exploits:
Users that are interested in windows-kernel-exploits are comparing it to the libraries listed below
- linux-kernel-exploits Linux平台提权漏洞集合☆5,335Updated 4 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,005Updated last year
- Windows Exploit Suggester - Next Generation☆4,289Updated last week
- Linux privilege escalation auditing tool☆5,739Updated 11 months ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆8,916Updated 8 months ago
- ✍️ A curated list of CVE PoCs.☆3,356Updated 3 years ago
- Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability detai…☆2,954Updated last year
- MS17-010☆2,157Updated last year
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,839Updated 4 years ago
- A swiss army knife for pentesting networks☆8,542Updated last year
- List of Awesome CobaltStrike Resources☆4,058Updated last year
- Monitor linux processes without root permissions☆5,059Updated 2 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,140Updated last year
- Privilege Escalation Project - Windows / Linux / Mac☆2,470Updated 3 months ago
- Defeating Windows User Account Control☆6,509Updated 5 months ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,045Updated 3 months ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,475Updated 3 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,040Updated 4 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,514Updated 4 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,490Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆13,780Updated last week
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆6,648Updated this week
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,461Updated 2 months ago
- Webshell && Backdoor Collection☆1,851Updated 4 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,711Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,038Updated 4 years ago
- The ultimate WinRM shell for hacking/pentesting☆4,656Updated last month
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆5,592Updated 3 months ago
- Red Teaming Tactics and Techniques☆4,116Updated 4 months ago
- Adversary Emulation Framework☆8,782Updated this week