material for exploit development
☆18May 3, 2019Updated 6 years ago
Alternatives and similar repositories for the-day-of-nightmares
Users that are interested in the-day-of-nightmares are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool is developed for burp suite practitioner certificate exam and HTTP Request Smuggling labs. The most important about this tool i…☆22Sep 15, 2022Updated 3 years ago
- ☆28Jun 18, 2019Updated 6 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Aug 20, 2020Updated 5 years ago
- Cleanup of older MISP events can require some work until now☆28Apr 5, 2026Updated 3 weeks ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆128Jun 19, 2020Updated 5 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆50Jun 8, 2020Updated 5 years ago
- The most extensive collection of BOFs (Beacon Object Files) tailored for Red Teams using C++23☆23Jun 19, 2025Updated 10 months ago
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 6 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- SweetPotato修改版,用于webshell下执行命令☆13Nov 22, 2020Updated 5 years ago
- A Crude C2 to Demonstrate Using QR Codes for Channel Traffic☆39Sep 21, 2020Updated 5 years ago
- OSEE Preparation☆192Feb 15, 2019Updated 7 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- ☆12Nov 21, 2023Updated 2 years ago
- SqlServer Linked Password Dumper.☆17Apr 28, 2017Updated 9 years ago
- ☆14Aug 9, 2021Updated 4 years ago
- Fully based on Advanced Windows exploitation. Kernel driver exploitation, browser exploitation, heap spraying etc....☆14Nov 1, 2020Updated 5 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆115Nov 19, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆19Sep 21, 2020Updated 5 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- WIP - A tutorial for OWASP ZAP☆13Feb 12, 2020Updated 6 years ago
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- Penetration testing “drop box”☆14Sep 12, 2018Updated 7 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- Small POC in powershell exploiting hardlinks during the VM deletion process☆55Jan 18, 2020Updated 6 years ago
- ☆15Dec 22, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆21Jun 23, 2018Updated 7 years ago
- An advanced multithreaded admin panel finder written in python.☆14Nov 6, 2020Updated 5 years ago
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 6 years ago
- Simple Python Elgamal Encryption and Decryption Tool☆10Jan 7, 2020Updated 6 years ago
- ☆22Dec 22, 2020Updated 5 years ago
- Clipboard access notification inspired by iOS 14☆22Jun 30, 2020Updated 5 years ago
- Master Thick Client Penetration Testing: Explore practical methodologies, uncover vulnerabilities, and enhance security.☆19Apr 6, 2024Updated 2 years ago