alphaSeclab / all-my-collection-repos
All Security Resource Collections Repos That I Published.
☆121Updated 4 years ago
Alternatives and similar repositories for all-my-collection-repos:
Users that are interested in all-my-collection-repos are comparing it to the libraries listed below
- Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.☆98Updated 4 years ago
- Resources About Shellcode☆210Updated 4 years ago
- Awesome webshell collection. Including 150 Github repo, and 200+ blog posts.☆167Updated 5 years ago
- 2020年发布到阿尔法实验室微信公众号的所有安全资讯汇总☆41Updated 4 years ago
- rsGen is a Reverse Shell Payload Generator for hacking.☆78Updated 2 years ago
- Resources About Cobalt Strike. 100+ Tools And 200+ Posts.☆247Updated 4 years ago
- Steal privileged token to obtain SYSTEM shell☆246Updated 4 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆69Updated 4 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Updated last year
- Green-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.☆128Updated 6 years ago
- Elevation Of Privileges Proof of Concept for Windows (win7-win10)☆30Updated 4 years ago
- Windows 10 LPE (UAC Bypass) in Windows Store (WSReset.exe)☆264Updated 5 years ago
- Exploit Pack - Project☆69Updated 5 years ago
- Bluekeep(CVE 2019-0708) exploit released☆105Updated 5 years ago
- Shellcode Encrypter & Decrypter via XOR Cipher☆59Updated 5 years ago
- Linux x86_64 Process Injection Utility☆59Updated 3 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆88Updated 4 years ago
- ☆57Updated 6 years ago
- BypassAV ShellCode Loader (Cobaltstrike/Metasploit)☆178Updated 5 years ago
- WikiLeaks Vault 7 CIA Hacking Tools☆50Updated 7 years ago
- ClamAV_0Day_exploit☆89Updated 5 years ago
- CVE-2020-0796 Local Privilege Escalation POC☆240Updated 4 years ago
- Poc for CVE-2019-1253☆154Updated 3 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆248Updated last year
- gui uac bypass (netplwiz.exe)☆64Updated 5 years ago
- JScript RAT☆99Updated 4 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆107Updated 4 years ago