adithyan-ak / BufferSploitLinks
Stack based buffer overflows attacks made simple. BufferSploit is a semi automated CLI based tool for performing stack based buffer overflow attacks with ease.
☆20Updated 4 years ago
Alternatives and similar repositories for BufferSploit
Users that are interested in BufferSploit are comparing it to the libraries listed below
Sorting:
- Useful scripts for pen testing. Require modification to run☆13Updated 4 years ago
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆26Updated 3 years ago
- PowerShell payload generator☆117Updated 3 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- Pentest stuff☆49Updated last year
- Windows privilege escalation with cmd☆91Updated 3 years ago
- Cheat-Sheet of tools for penetration testing☆56Updated 2 years ago
- Tool to find SMTP servers vulnerable to open relay☆82Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64Updated 4 years ago
- ☆24Updated 5 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated last year
- Customizable TCP fuzzing tool to test for remote buffer overflows.☆51Updated 5 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 7 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago
- Enumerate a target Based off of Nmap Results☆79Updated last year
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Build interactive map of cameras from Shodan☆23Updated 5 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆82Updated 2 years ago
- Pentesting notes☆17Updated 6 months ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- ☆30Updated 5 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 8 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Updated 3 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Command Execution exploiter with an auto connection handling☆32Updated 3 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 3 weeks ago