A python based semi-automatic buffer overflow exploit script
☆16Sep 6, 2020Updated 5 years ago
Alternatives and similar repositories for BOF-SemiAutomatic
Users that are interested in BOF-SemiAutomatic are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆32Mar 2, 2019Updated 7 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- CLI to obtain JWT, SAML tokens, and AWS credentials using Auth0, OAuth and SAML☆15Dec 9, 2022Updated 3 years ago
- ARCHIVED: Use 'peh' instead☆16May 4, 2021Updated 4 years ago
- Reconnaissance and Enumeration automation script☆53Mar 16, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Reverse shell macro using Word VBA☆17Oct 10, 2020Updated 5 years ago
- My configs, tools and what not. For everytime that I blow up my vm....☆18Jan 21, 2020Updated 6 years ago
- Super Simple Windows Web Server☆47Mar 16, 2023Updated 3 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆13Aug 30, 2022Updated 3 years ago
- Tool for enumerate subdomains by Brute-force, or by using different options while grabbing results.☆14Sep 7, 2023Updated 2 years ago
- ☆13Mar 7, 2025Updated last year
- A Tool for Domain Flyovers☆18Nov 12, 2019Updated 6 years ago
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.☆14Nov 20, 2025Updated 4 months ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Nov 21, 2020Updated 5 years ago
- A compilation of customizations for Debian-based Linux distrubutions (mostly Pop!_OS and Kali Linux) and (finally) a mostly automated scr…☆18Jan 1, 2026Updated 2 months ago
- ☆356Apr 27, 2021Updated 4 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- ☆14Nov 16, 2024Updated last year
- ☆12Feb 8, 2018Updated 8 years ago
- ☆19Jan 14, 2026Updated 2 months ago
- Stuff I use for OSCP/HTB/VHL and so on.☆111Jan 21, 2020Updated 6 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆18Feb 10, 2022Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- An advanced brute forcer written in GO for the pen-testers willing to find a more advanced SSH brute forcer☆15Nov 20, 2025Updated 4 months ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- A repository with my code snippets for research/education purposes.☆53Jul 28, 2023Updated 2 years ago
- Material i gathered for the Offensive Security Certified Professional OSCP☆14Jan 15, 2019Updated 7 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Security Assessment Data Management and Analysis Tool☆38May 6, 2021Updated 4 years ago
- Detonate malware on VMs and get logs & detection status☆89Mar 17, 2026Updated last week
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Cradlepoint IBR600C☆25Sep 7, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Reverse Shell-able Windows exploits short POCs.☆35Sep 28, 2020Updated 5 years ago
- Simple C2 using GitHub repository as comms channel.☆32Oct 26, 2024Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- ☆22Feb 6, 2023Updated 3 years ago
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 7 years ago
- Userland API monitor for threat hunting☆58Mar 4, 2020Updated 6 years ago
- CVE-2018-9276 PRTG < 18.2.39 Authenticated Command Injection (Reverse Shell)☆36Dec 3, 2020Updated 5 years ago