Shadow2xx / List-of-hacking-wargames
☆40Updated this week
Related projects: ⓘ
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆94Updated 7 years ago
- A PowerShell example of the Windows zero day priv esc☆320Updated 6 years ago
- ☆130Updated this week
- Small CTF challenges running on Docker☆157Updated 6 years ago
- Platform independent peCloak fork based on Capstone☆103Updated 8 years ago
- Tool to make in memory man in the middle☆124Updated 5 years ago
- All materials from our Black Hat 2018 "Subverting Sysmon" talk☆136Updated 6 years ago
- Pypykatz server☆124Updated 5 years ago
- Fork of mona.py with x64dbg support☆95Updated 2 years ago
- ☆138Updated this week
- ☆40Updated this week
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆149Updated 3 years ago
- Crypto tool for pentest and ctf : try to uncipher data using multiple algorithms and block chaining modes. Usefull for a quick check on u…☆121Updated 6 years ago
- ☆77Updated this week
- ☆122Updated 6 years ago
- some pocs for antivirus evasion☆129Updated last year
- DefCon24☆119Updated 8 years ago
- Penetration Testing/Security Cheatsheets☆191Updated 8 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆142Updated 9 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆124Updated 6 years ago
- Local UNIX PrivEsc Aggregation☆244Updated 8 years ago
- MS17-010☆63Updated 7 years ago
- ☆30Updated this week
- Another Repo of Malware. Enjoy. <3☆60Updated 5 years ago
- ☆136Updated 7 years ago
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆296Updated last year
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆205Updated 6 years ago
- A bunch of useful SSH tools for powershell☆118Updated 5 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆115Updated 4 years ago