adithyan-ak / BufferSploitLinks
Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overflow attacks with ease.
☆20Updated 4 years ago
Alternatives and similar repositories for BufferSploit
Users that are interested in BufferSploit are comparing it to the libraries listed below
Sorting:
- Useful scripts for pen testing. Require modification to run☆13Updated 5 years ago
- Windows privilege escalation with cmd☆90Updated 4 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆26Updated 3 months ago
- OSCP guide and Red Team assessment Guide☆37Updated 5 years ago
- A shell script that mimics sudo and sends you back the password☆44Updated 2 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 8 years ago
- OSWE Preparation☆38Updated 6 years ago
- Pentest stuff☆48Updated 2 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Updated 3 years ago
- PowerShell payload generator☆119Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- ☆30Updated 5 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆40Updated 5 years ago
- Cheat-Sheet of tools for penetration testing☆54Updated 2 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 6 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆143Updated last month
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 5 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 5 months ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 5 years ago
- Offensive Security Wireless Professional☆17Updated 5 years ago
- My collection of self-written exploits☆24Updated 3 years ago
- Super organized and flexible script for sending phishing campaigns☆56Updated 4 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated last year