UlisseMini / pwnLinks
pwntools for go!
☆12Updated 5 years ago
Alternatives and similar repositories for pwn
Users that are interested in pwn are comparing it to the libraries listed below
Sorting:
- PoC for CVE-2020-11651☆6Updated 5 years ago
- Simulates a logged in user.☆16Updated last year
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- SSDP Service Discovery☆17Updated 6 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- ☆16Updated 10 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- various slides and presentations I've worked on☆19Updated 3 months ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- ☆14Updated 3 years ago
- ☆21Updated 5 years ago
- Encode binary as English text over HTTP(s)☆30Updated last year
- Self defense post module for metasploit☆17Updated 5 years ago
- Windows 10 Exploit☆30Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Updated 6 years ago
- ☆13Updated 4 years ago
- Is this IP a C2 server?☆28Updated 5 years ago
- Docker projects to retain beacon source IPs using C2 relaying infra☆11Updated 6 years ago
- CVE-2019-12949☆26Updated 6 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆12Updated 9 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆32Updated 10 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- CVE-2019-18890 POC (Proof of Concept)☆10Updated 5 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 7 years ago
- ☆13Updated 4 years ago