freddiebarrsmith / Advanced-Windows-Exploit-Development-PracticeLinks
ASLR Evasion, Egghunters, SEH Overwrites
☆29Updated 4 years ago
Alternatives and similar repositories for Advanced-Windows-Exploit-Development-Practice
Users that are interested in Advanced-Windows-Exploit-Development-Practice are comparing it to the libraries listed below
Sorting:
- Scripts for OSCE☆18Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- ☆20Updated 4 years ago
- Red Team C2 and Post Exploitation code☆36Updated last week
- Simple C2 over the Trello API☆38Updated 2 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆37Updated 5 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆27Updated 2 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 4 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 7 years ago
- ☆17Updated 5 years ago
- Sources code extracted from malwares for analysis☆38Updated 2 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27Updated 3 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆21Updated 3 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 4 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆36Updated 6 years ago
- POC code to crash Windows Event Logger Service☆27Updated 4 years ago
- Encode binary as English text over HTTP(s)☆30Updated last year
- Sp00fer blog post -☆26Updated 2 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago