Windows And Ways To Break It
☆100Jan 28, 2026Updated last month
Alternatives and similar repositories for Windows
Users that are interested in Windows are comparing it to the libraries listed below
Sorting:
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Sep 18, 2024Updated last year
- This is a shell script that creates an SSH backdoor on an iPhone.☆224Jan 7, 2026Updated 2 months ago
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆41Jan 18, 2025Updated last year
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Jun 23, 2022Updated 3 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆94Dec 2, 2025Updated 3 months ago
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- David Lin's Windows 10 Cheatsheet☆11Mar 5, 2024Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated last month
- ☆25Jan 11, 2023Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- SSH Zero-Day Made By ClumsyLulz☆127Jan 7, 2026Updated 2 months ago
- Red Team tools, infrastructure, and hardware weaponized☆112Mar 7, 2026Updated 2 weeks ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- my attempt at making sense of lambda calculus☆19Oct 6, 2022Updated 3 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- A small script to resolve domains to Azure AD tenants (and OAuth login portals)☆30Jun 26, 2023Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Dec 5, 2023Updated 2 years ago
- ☆11Feb 12, 2023Updated 3 years ago
- Exploit for the CVE-2023-23397☆160Mar 15, 2023Updated 3 years ago
- ☆26Mar 11, 2025Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆184Feb 2, 2026Updated last month
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 3 months ago
- Chat GPT Things by Taylor Newsome☆12Mar 19, 2024Updated 2 years ago
- ☆18Apr 3, 2023Updated 2 years ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆321Feb 1, 2026Updated last month
- Wireshark RDP resources☆221Jun 2, 2025Updated 9 months ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆65Mar 8, 2023Updated 3 years ago
- A RedTeam Toolkit☆406Aug 14, 2025Updated 7 months ago
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆384Nov 2, 2023Updated 2 years ago
- ☆24Feb 7, 2025Updated last year
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers☆369May 22, 2023Updated 2 years ago
- Collection's of Tech Talk that are presented by me :)☆102Jan 12, 2025Updated last year
- Manage attack surface data on Elasticsearch☆25Nov 20, 2023Updated 2 years ago