Tips and tricks on reversing and exploiting Windows using free and easy to get tools.
☆33Mar 21, 2023Updated 3 years ago
Alternatives and similar repositories for Reversing-and-Exploiting-with-Free-Tools-Series
Users that are interested in Reversing-and-Exploiting-with-Free-Tools-Series are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python3 Scripts for OSCP buffer overflow exploitation☆12May 12, 2021Updated 4 years ago
- NTAPI hook bypass with (semi) legit stack trace☆19May 9, 2023Updated 2 years ago
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 3 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- A simple script to elevate current session to SYSTEM (needs to be run as Administrator)☆16Nov 11, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Feb 16, 2025Updated last year
- ☆36Feb 5, 2026Updated last month
- A risk rating calculation methodology that uses the OWASP Risk Rating Methodology as a basis.☆32Sep 4, 2024Updated last year
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆28Aug 4, 2022Updated 3 years ago
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- A slick, modern, privacy-focused web interface for viewing and analyzing Nuclei scan results. Built for pentesters & bug hunters who want…☆27Mar 31, 2025Updated 11 months ago
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Create machine images containing the Nessus vulnerability scanner☆13Mar 16, 2026Updated last week
- ☆10Jan 9, 2026Updated 2 months ago
- A PowerShell module for accessing the XKCD API to get the details of and (optionally) download the excellent webcomics @ http://xkcd.com☆16Sep 7, 2024Updated last year
- 🦫 Hop server side SDK for Go☆12May 30, 2023Updated 2 years ago
- Recreating and reviewing the Windows persistence methods☆39Nov 18, 2021Updated 4 years ago
- My personal shellcode loader☆32Mar 9, 2023Updated 3 years ago
- Travis builds for certbot.eff.org☆12Jan 19, 2022Updated 4 years ago
- Collection of different rootkit functionality, each driver representing a different rootkit component☆14May 27, 2025Updated 10 months ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Simple .NET assembly to interact with services.☆43Sep 27, 2019Updated 6 years ago
- Tcp server with nothing but Lua code☆40Sep 13, 2019Updated 6 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- ☆15May 3, 2024Updated last year
- Writing Your Own Ticket to the Cloud Like APT: A Deep-dive to AD FS Attacks, Detections, and Mitigations☆12Dec 9, 2022Updated 3 years ago
- Modified version of Impacket to use dynamic NTLMv2 Challenge/Response☆20Dec 26, 2022Updated 3 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- EA-HAS-Bench: Energy-Aware Hyperparameter and Architecture Search Benchmark (ICLR Spotlight 2023)☆18Dec 8, 2024Updated last year
- ☆11Nov 24, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆16Jun 1, 2018Updated 7 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆14Aug 17, 2020Updated 5 years ago
- ☆13Nov 17, 2021Updated 4 years ago
- ☆15Oct 31, 2022Updated 3 years ago
- Use hardware breakpoints to spoof the call stack for both syscalls and API calls☆203Jun 6, 2024Updated last year
- Public exploits☆16May 28, 2018Updated 7 years ago
- ☆79Aug 2, 2023Updated 2 years ago