ajinabraham / Exploit-Research-Ported
Exploit Research & Development - Ported Exploits
☆11Updated 7 years ago
Alternatives and similar repositories for Exploit-Research-Ported:
Users that are interested in Exploit-Research-Ported are comparing it to the libraries listed below
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- ☆16Updated 6 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- module for certexfil☆15Updated 2 years ago
- ☆10Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆12Updated 10 years ago
- C & Shellcode Playground..☆11Updated 7 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 6 years ago
- A rootkit for linux kernel >= 3.0☆19Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- ☆11Updated 6 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- buffer overflow examples☆22Updated 7 years ago