Exploit Research & Development - Ported Exploits
☆11Jul 22, 2017Updated 8 years ago
Alternatives and similar repositories for Exploit-Research-Ported
Users that are interested in Exploit-Research-Ported are comparing it to the libraries listed below
Sorting:
- Proof of Concepts, Exploits☆28Apr 8, 2025Updated 11 months ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- InSpec profile for Microsoft Windows 10, against DISA's Microsoft Windows 10 Security Technical Implementation Guide (STIG) Version 1, Re…☆15Jan 9, 2025Updated last year
- CVE-2021-21972 Unauthorized RCE in VMware vCenter metasploit exploit script☆20Mar 7, 2021Updated 5 years ago
- ☆16Mar 6, 2019Updated 7 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago
- Python 3 demo of Command and Control (C&C) bot☆12May 3, 2020Updated 5 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Apr 15, 2014Updated 11 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 6 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Mar 11, 2021Updated 5 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- Anotações, roadmaps, dicas e guia de pentest.☆11Jan 13, 2022Updated 4 years ago
- ☆20Sep 2, 2021Updated 4 years ago
- ☆16Dec 31, 2016Updated 9 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Java hex viewer component☆20Mar 4, 2011Updated 15 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- Ossec cookbook for Chef, with secure & automated key management☆21Jun 13, 2013Updated 12 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆22Mar 31, 2019Updated 6 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Sysprep Volatile Environment LPE (2017)☆16Jun 28, 2025Updated 8 months ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Apr 3, 2021Updated 4 years ago
- A simplex kernel-based keylogger written for fun, not evil.☆16Apr 3, 2018Updated 7 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25May 6, 2024Updated last year
- php Non-AlphaNumeric Encoder☆20Apr 8, 2017Updated 8 years ago
- The revival of the popular method of installing linux on android.☆18Dec 27, 2020Updated 5 years ago