cldrn / pentestingLinks
Misc resources for my daily pentesting...
☆18Updated 7 months ago
Alternatives and similar repositories for pentesting
Users that are interested in pentesting are comparing it to the libraries listed below
Sorting:
- ☆21Updated 6 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Windows 10 Exploit☆30Updated 7 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33Updated last year
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 7 years ago
- Generate pentest reports based on github issues.☆16Updated 2 years ago
- the Open Source Windows Privilege Escalation Guide☆10Updated 8 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- SharePoint Security Auditor☆21Updated 9 years ago
- Fuzzing Framework☆10Updated 8 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Updated 6 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- ☆21Updated 6 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 7 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Updated 9 years ago
- Scripts for OSCE☆18Updated 6 years ago
- ☆25Updated 5 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- \ PowerAvails Powershell /☆11Updated 7 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Updated 8 years ago
- Group Policy Hijacking☆32Updated 7 years ago
- Creating a vulnerable environment and the PoC☆15Updated 5 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45Updated 6 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆27Updated 8 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- My Shellcode Archive☆29Updated 8 years ago
- Telco training☆26Updated 7 years ago