Windows And Ways To Break It
☆100Jan 28, 2026Updated last month
Alternatives and similar repositories for Windows
Users that are interested in Windows are comparing it to the libraries listed below
Sorting:
- A privilege escalation vulnerability exists in Windows due to a flaw in the implementation of the Atom Table. An attacker could exploit t…☆29Sep 18, 2024Updated last year
- This is a shell script that creates an SSH backdoor on an iPhone.☆225Jan 7, 2026Updated last month
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆48Dec 5, 2023Updated 2 years ago
- Windows Defender Manager is a tool that helps stop Windows Defender. It works with the Antimalware Service Executable of all versions of …☆43Jan 18, 2025Updated last year
- ☆25Jan 11, 2023Updated 3 years ago
- A simple pentest container equipped with common python pentest tools.☆42Jan 30, 2026Updated last month
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆92Dec 2, 2025Updated 2 months ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Red Team tools, infrastructure, and hardware weaponized☆109Dec 29, 2025Updated 2 months ago
- Check IP addresses against known cloud provider IP address ranges☆47Feb 7, 2026Updated 3 weeks ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- David Lin's Windows 10 Cheatsheet☆11Mar 5, 2024Updated last year
- ☆11Feb 12, 2023Updated 3 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- SSH Zero-Day Made By ClumsyLulz☆128Jan 7, 2026Updated last month
- Manage attack surface data on Elasticsearch☆24Nov 20, 2023Updated 2 years ago
- This script allows you to search for an Instagram profile using user ID or retrieve a profile's ID by username. It utilizes the Instagram…☆84Jan 29, 2026Updated last month
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- Chat GPT Things by Taylor Newsome☆12Mar 19, 2024Updated last year
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆26Jul 14, 2024Updated last year
- GregsBestFriend process injection code created from the White Knight Labs Offensive Development course☆204Jun 23, 2023Updated 2 years ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆321Feb 1, 2026Updated last month
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆14Jun 23, 2022Updated 3 years ago
- OSCP Study Guide☆40Oct 10, 2022Updated 3 years ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆65Mar 8, 2023Updated 2 years ago
- Collection's of Tech Talk that are presented by me :)☆101Jan 12, 2025Updated last year
- 1000 black hat tools Collected From github☆16Nov 28, 2019Updated 6 years ago
- ☆19Mar 4, 2023Updated 2 years ago
- Fetch information about a public Google document.☆13Aug 4, 2023Updated 2 years ago
- ☆24Feb 7, 2025Updated last year
- Scraping Kit is made up of several tools for scraping services for keywords, useful for initial enumeration of Domain Controllers or if y…☆99Jul 7, 2023Updated 2 years ago
- Wireshark RDP resources☆221Jun 2, 2025Updated 8 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆183Feb 2, 2026Updated 3 weeks ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated 2 months ago
- PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers☆369May 22, 2023Updated 2 years ago