egre55 / windows-kernel-exploitsLinks
Windows Kernel Exploits
☆66Updated 7 years ago
Alternatives and similar repositories for windows-kernel-exploits
Users that are interested in windows-kernel-exploits are comparing it to the libraries listed below
Sorting:
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Juicy Potato for x86 Windows☆120Updated 5 years ago
- ☆104Updated 5 years ago
- Active Directory Labs/exams Review☆252Updated 4 years ago
- Changes for Visual Studio 2013☆117Updated 9 years ago
- Preparation for OSWE☆42Updated 5 years ago
- Scripts created to help with post exploitation of a Windows host☆97Updated 4 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 3 years ago
- Username guessing tool primarily for use against the default Solaris SMTP service. Can use either EXPN, VRFY or RCPT TO.☆122Updated 3 years ago
- ☆81Updated 5 years ago
- ☆142Updated last year
- PEN-300/OSEP Public resources for PEN-300 Training☆100Updated 3 years ago
- Powershell crazy and sometimes diabolic scripts☆156Updated 4 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆45Updated 10 years ago
- Preparation guide for Offensive Security's PEN-300 course and OSEP certification exam☆219Updated 4 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆41Updated last year
- OSCP Cheatsheets☆96Updated 5 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆227Updated 2 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆62Updated 5 years ago
- OSCP notes☆53Updated 4 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆143Updated 3 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆102Updated last year
- Squid Pivoting Open Port Scanner☆75Updated 5 months ago
- ☆162Updated last month
- ☆160Updated 3 years ago
- ☆29Updated 4 years ago
- Dumping LAPS from Python☆267Updated 2 years ago
- Reverse Shell-able Windows exploits short POCs.☆31Updated 4 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago