A python based semi-automatic buffer overflow exploit script
☆16Sep 6, 2020Updated 5 years ago
Alternatives and similar repositories for BOF-SemiAutomatic
Users that are interested in BOF-SemiAutomatic are comparing it to the libraries listed below
Sorting:
- Post exploitation helper☆37Apr 25, 2023Updated 2 years ago
- Reverse shell macro using Word VBA☆17Oct 10, 2020Updated 5 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- ARCHIVED: Use 'peh' instead☆16May 4, 2021Updated 4 years ago
- Reconnaissance and Enumeration automation script☆53Mar 16, 2021Updated 4 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Mar 2, 2019Updated 7 years ago
- Detonate malware on VMs and get logs & detection status☆84Jan 29, 2026Updated last month
- wew oscp☆280Jun 28, 2022Updated 3 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- ☆16Jan 20, 2026Updated last month
- Collection of walk through, hints, notes, code snippets, tools logs and resources for vulnerable CTF-style boxes☆12Dec 3, 2025Updated 3 months ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- A Modern, stable and advanced login system.☆13Oct 13, 2021Updated 4 years ago
- Publicly available training resources used by Security PS to train application security engineers☆10Feb 16, 2021Updated 5 years ago
- Raspberry Pi Smart Bartender☆14Apr 22, 2022Updated 3 years ago
- ☆12Mar 7, 2025Updated 11 months ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Tool for enumerate subdomains by Brute-force, or by using different options while grabbing results.☆14Sep 7, 2023Updated 2 years ago
- A small PoC using DInvoke, dynamically mapping a DLL and executing Win32 APIs for process injection.☆10Dec 16, 2021Updated 4 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- ☆14Jan 2, 2026Updated 2 months ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ☆13Apr 15, 2024Updated last year
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Raspberry Pi night vision goggle code. python code that creates a side by side stero view (steroscopic) from a single camera☆13May 8, 2021Updated 4 years ago
- BypassAV无net添加windows用户☆10Jan 7, 2021Updated 5 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- Code Examples for the Web and Cloud Applications Security Course☆12Feb 23, 2026Updated last week
- Chef library cookbook for managing AWS Security Groups☆11Sep 7, 2016Updated 9 years ago
- Test antiviruses☆12Dec 3, 2023Updated 2 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- ☆11Oct 2, 2025Updated 5 months ago
- Synchronize properties from your Obsidian notes with a Markwhen timeline file.☆12Sep 20, 2025Updated 5 months ago
- - Automated Discord bot for Submitting Rebates and getting you easy visa cards. Educational purposes only.☆16May 13, 2021Updated 4 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- .NET Code Virtualization with cool features. Once intended to sell. Rip VirtualGuard.io☆16Feb 8, 2026Updated 3 weeks ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago