Tips and tricks on reversing and exploiting Windows using free and easy to get tools.
☆33Mar 21, 2023Updated 2 years ago
Alternatives and similar repositories for Reversing-and-Exploiting-with-Free-Tools-Series
Users that are interested in Reversing-and-Exploiting-with-Free-Tools-Series are comparing it to the libraries listed below
Sorting:
- Windows Network File System Remote exploit for CVE-2022-30136☆14Jul 11, 2023Updated 2 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆16Nov 11, 2024Updated last year
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- A PowerShell module for accessing the XKCD API to get the details of and (optionally) download the excellent webcomics @ http://xkcd.com☆16Sep 7, 2024Updated last year
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Recreating and reviewing the Windows persistence methods☆39Nov 18, 2021Updated 4 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- An API to read, create, and modify .uasset and .uexp files☆16Nov 3, 2020Updated 5 years ago
- Create and enumerate hidden desktops.☆91Dec 12, 2023Updated 2 years ago
- ☆22Jul 29, 2021Updated 4 years ago
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆28Aug 4, 2022Updated 3 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Feb 16, 2025Updated last year
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆20Dec 26, 2022Updated 3 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- Piece of code to detect and remove hooks in IAT☆65May 30, 2022Updated 3 years ago
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆32Sep 4, 2024Updated last year
- Demo project how to bypass the disable_functions security control of PHP on Linux☆27May 30, 2019Updated 6 years ago
- Get Fine Grained Password Policy☆77Apr 15, 2025Updated 10 months ago
- Use hardware breakpoints to spoof the call stack for both syscalls and API calls☆203Jun 6, 2024Updated last year
- ☆12Apr 8, 2025Updated 11 months ago
- ☆79Aug 2, 2023Updated 2 years ago
- A Practical example of ELAM (Early Launch Anti-Malware)☆36Nov 12, 2021Updated 4 years ago
- Use COM Component Bypass UAC,Dll Version☆36Apr 17, 2021Updated 4 years ago
- AD Live changes viewer☆36Feb 25, 2023Updated 3 years ago
- Tool for extracting credentials locally stored by web browsers☆37Jun 25, 2022Updated 3 years ago
- My personal shellcode loader☆32Mar 9, 2023Updated 3 years ago
- Active Directory certificate abuse☆43Oct 9, 2022Updated 3 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- A Streamlined FTP-Driven Command and Control Conduit for Interconnecting Remote Systems.☆89Nov 9, 2023Updated 2 years ago
- Assess Windows OS for security misconfigurations and hardening opportunities.☆36Jul 20, 2024Updated last year
- ☆44Oct 16, 2025Updated 4 months ago
- Powershell script to include in your SharePoint Framework solution which allows having an automated deployment http://www.delucagiuliano.…☆10Jan 12, 2018Updated 8 years ago
- A lua plugin for Wireshark which contains dissectors for common maritime protocols.☆16Dec 8, 2025Updated 3 months ago
- A simple, reliable and reasonably fast network capture analyzer.☆26Mar 2, 2026Updated last week
- An interactive remote control panel for various devices☆15Feb 28, 2022Updated 4 years ago