bitsadmin / exploitsLinks
Public exploits
☆15Updated 7 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- A collection of curated Java Deserialization Exploits☆11Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- C & Shellcode Playground..☆11Updated 7 years ago
- ☆17Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 7 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- ☆12Updated 4 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Repository for LNK stuff☆31Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Updated 8 years ago
- Data exfiltration utility for testing detection capabilities☆58Updated 3 years ago
- Scripts for OSCE☆18Updated 6 years ago
- ☆18Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Random code snippets☆10Updated last year
- Subdomain Enumeration and Scanner☆33Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- AppXSVC Service race condition - privilege escalation☆28Updated 6 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 4 years ago
- ☆14Updated last year
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Sp00fer blog post -☆26Updated 3 years ago
- NmapPy - Python implementation of Nmap☆36Updated 6 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago