SkyBulk / exploit-development
☆24Updated 5 years ago
Alternatives and similar repositories for exploit-development:
Users that are interested in exploit-development are comparing it to the libraries listed below
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- ☆19Updated 3 years ago
- Noob Penetration tester☆11Updated 9 months ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Reverse Shell troll software☆12Updated 5 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Simple C2 over the Trello API☆38Updated 2 years ago
- Cobalt Strike/C2 Servers☆13Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- Quick script to find info about a syscall in a target architecture☆18Updated 5 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆35Updated last year
- ☆16Updated 3 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 5 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- Scripts for OSCE☆18Updated 6 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- ☆24Updated 2 years ago
- material for exploit development☆17Updated 5 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆36Updated 5 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Updated 6 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Updated 7 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 3 years ago