bitsadmin / exploitsLinks
Public exploits
☆15Updated 7 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- module for certexfil☆15Updated 2 years ago
- Random Tips and Writeups.☆13Updated 6 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- ☆17Updated 6 years ago
- Web based favicon recon tool made using streamlit.☆9Updated 2 years ago
- pwncat windows c2 components☆19Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- ☆14Updated 3 years ago
- ☆12Updated 4 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Burp Suite Pro extension☆10Updated 8 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Updated 3 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆14Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- ☆12Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- ☆14Updated last year
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆11Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 5 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago