Vedant-Bhalgama / OSCP-buffer-overflow-prepLinks
So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for practicing Buffer OverFlows!
☆11Updated 4 years ago
Alternatives and similar repositories for OSCP-buffer-overflow-prep
Users that are interested in OSCP-buffer-overflow-prep are comparing it to the libraries listed below
Sorting:
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- A cheatsheet and mindmap for CRTO certification☆13Updated 2 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆79Updated last year
- ☆47Updated 3 years ago
- A very simple python script to encode and decode PowerShell one-liners.☆24Updated 3 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆93Updated 4 years ago
- Weaponising C# - Fundamentals Training Content☆70Updated 4 years ago
- Simple tool to perform HTML Smuggling.☆68Updated 4 years ago
- ☆84Updated 3 years ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆102Updated 2 years ago
- Simple & Customizable DNS Data Exfiltrator☆112Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆103Updated 4 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆116Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- ☆141Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- Generate malicious macros for MS Office and Libreoffice, created during OSCP prep☆20Updated 2 years ago
- ☆38Updated 3 years ago
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆19Updated 3 years ago
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆41Updated 4 years ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆172Updated 7 months ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated last year
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆14Updated last year
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆194Updated 2 months ago