Helper script for identifying bad characters based on (Immunity|edb)'s stack dump
☆13Mar 18, 2023Updated 3 years ago
Alternatives and similar repositories for WhatTheStack
Users that are interested in WhatTheStack are comparing it to the libraries listed below
Sorting:
- Windows Post-Exploitation tools wrapper☆12Jun 24, 2024Updated last year
- ☆16Jun 29, 2022Updated 3 years ago
- A scanner that files with compromised or untrusted code signing certificates written in python.☆65Sep 6, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Aug 17, 2020Updated 5 years ago
- Parser to convert BURP Pro .XML to .CSV and build a Word .Docx Template☆14Dec 8, 2021Updated 4 years ago
- Kali Linux in Docker + Ubuntu 22.04 in Docker for Bug Bounty, Penetration Testing, Security Research, Computer Forensics and Reverse Engi…☆24Sep 18, 2024Updated last year
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- 64bit WIndows 10 shellcode dat pops dat calc - Dynamic & Null Free☆65Mar 8, 2023Updated 3 years ago
- ☆14Dec 2, 2020Updated 5 years ago
- ☆13Aug 15, 2017Updated 8 years ago
- Primitive x86 32bit Operating System with FAT32 File System and a Kernel☆11Aug 30, 2021Updated 4 years ago
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- Nexus Web is the interface of Blue Brain Nexus☆18Feb 26, 2025Updated last year
- Training material for the Shellcode-Lab, including Slides and Codes☆20Jun 13, 2019Updated 6 years ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- AV/EDR evasion via direct and indirect system calls Windows NT 3.1 through Windows 11 24H2 · x64 · x86 · WoW64 · ARM64☆366Mar 7, 2026Updated last week
- HackTheBox High Definition Badge Generator☆28Jul 1, 2019Updated 6 years ago
- A basic thread library implemented in C++. It allows for multi-threaded programs using primitives such as lock, unlock, yield, wait, sign…☆12Oct 11, 2011Updated 14 years ago
- An example of how a driver can register a handle creation callback.☆16Jun 12, 2023Updated 2 years ago
- ☆37Feb 11, 2023Updated 3 years ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- Parsing and evaluating a math expression using a recursive descent parser.☆17Feb 25, 2022Updated 4 years ago
- some sources about net practice and networking, and everything i learned in this project☆11Aug 16, 2022Updated 3 years ago
- ☆24Jul 17, 2025Updated 8 months ago
- OneDrive, operating on Microsoft Windows 11 Pro is vulnerable to DLL hijacking.☆21Nov 9, 2023Updated 2 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- ☆12Aug 22, 2017Updated 8 years ago
- Step-by-step strategy on where to start the project, and how, to avoid back-and-forth.☆15Feb 23, 2023Updated 3 years ago
- ☆12Sep 29, 2021Updated 4 years ago
- ☆19Apr 10, 2022Updated 3 years ago
- Community Tasks/Plans for PlumHound Queueing☆23Feb 3, 2023Updated 3 years ago
- Custom queries list for BloodHound☆32Jul 8, 2025Updated 8 months ago
- A Burp Suite extension for headless, unattended scanning.☆37Jun 24, 2020Updated 5 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆242May 5, 2023Updated 2 years ago
- Some handy bash scripts I used for the OSCP☆24Oct 1, 2022Updated 3 years ago
- ☆36Feb 14, 2023Updated 3 years ago
- PoC arbitrary WPM without a process handle☆20Jul 22, 2023Updated 2 years ago
- PowerShell implementation for AD CS☆116Mar 2, 2026Updated 2 weeks ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago