dzonerzy / winescalationView external linksLinks
Python based module to find common vulnerabilities which lead to Windows privilege escalation
☆30Sep 26, 2016Updated 9 years ago
Alternatives and similar repositories for winescalation
Users that are interested in winescalation are comparing it to the libraries listed below
Sorting:
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 8 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- ☆35Sep 18, 2015Updated 10 years ago
- A mutation based user mode (ring3) dumb in-memory Windows Kernel (IOCTL) Fuzzer/Logger. This script attach it self to any given process a…☆67Apr 16, 2014Updated 11 years ago
- ☆31Jan 4, 2018Updated 8 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Expression generator for WebAssembly☆18Jul 6, 2018Updated 7 years ago
- A dirty IDAPython script to dump windows system call number/name pairs as JSON☆36Feb 13, 2017Updated 9 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- ☆59May 1, 2019Updated 6 years ago
- A set of demos and a PowerShell module to interact with DotNetInterop.☆68Apr 7, 2018Updated 7 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Oct 3, 2012Updated 13 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- ☆48Nov 28, 2016Updated 9 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Nov 6, 2016Updated 9 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- Network aware keylogger: broadcasting on your local area network.☆22Jul 29, 2013Updated 12 years ago
- Code generator for binary parsing☆19Feb 1, 2020Updated 6 years ago
- Agent installed on node to launch IDA,Bindiff,... and send results to the server ( AutoDiffWeb )☆10Mar 25, 2016Updated 9 years ago
- ☆10Jul 30, 2017Updated 8 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 7 months ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- Apfell POC Chrome Extension Payload☆10Jun 24, 2020Updated 5 years ago
- python client/server keystroke logger☆23Oct 7, 2012Updated 13 years ago
- ☆22Jul 7, 2017Updated 8 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570)☆67May 27, 2018Updated 7 years ago
- Support x86 and x64☆66Apr 17, 2021Updated 4 years ago
- Building optimized shellcode using GCC. Suited for learning assembly and playing with the ABI☆77May 16, 2018Updated 7 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- Various Modules & Scripts for use with Viper Framework☆27Aug 20, 2019Updated 6 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Apr 20, 2017Updated 8 years ago
- ☆78May 24, 2018Updated 7 years ago
- InfoPath Phishing Repo Resource☆68Oct 26, 2017Updated 8 years ago
- Port of windbglib to x64dbgpy, in an effort to support mona.py in x64dbg.☆51Jul 29, 2019Updated 6 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.