devploit / unaalmes-writeupsLinks
Repository to save all write-ups from UAM challenges
☆29Updated 4 years ago
Alternatives and similar repositories for unaalmes-writeups
Users that are interested in unaalmes-writeups are comparing it to the libraries listed below
Sorting:
- ☆150Updated last year
- Simple script to generate commands to achieve reverse shells.☆119Updated 4 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆67Updated 5 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆141Updated 3 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- ☆36Updated 3 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆175Updated 5 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 4 years ago
- PowerShell Empire mod to post-exploit the World!☆137Updated 6 years ago
- Windows privilege escalation with cmd☆91Updated 3 years ago
- 8-14 character Hashcat masks based on analysis of 1.5 million NTLM hashes cracked while pentesting☆190Updated 5 years ago
- Script for Local Windows Enumeration☆32Updated 7 years ago
- An open source swiss army knife for arbitrary communication over application protocols☆241Updated 4 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- Cheap & Nasty Wordpress Command Execution Shell☆88Updated 6 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆213Updated 4 years ago
- Weaponizing Splunk with reverse and bind shells.☆183Updated 8 years ago
- DEFCON 27 slides and workshop materials.☆128Updated 5 years ago
- A Python API for Hack the Box platform interaction☆63Updated 4 years ago
- Simple & Customizable DNS Data Exfiltrator☆110Updated 2 years ago
- WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift☆33Updated 3 years ago
- ☆19Updated 3 years ago
- https://github.com/BC-SECURITY/Empire☆49Updated 2 years ago
- A Linux enumeration script for Hack The Box☆190Updated 5 years ago
- This is a weaponized WSUS exploit☆285Updated 2 years ago
- Comfy & powerful Red Team Infrastructure deployement using Docker☆13Updated 5 years ago
- ATTPwn☆214Updated last year
- An advanced graphical search engine for Exploit-DB☆119Updated last year