ASLR Evasion, Egghunters, SEH Overwrites
☆29Mar 6, 2021Updated 4 years ago
Alternatives and similar repositories for Advanced-Windows-Exploit-Development-Practice
Users that are interested in Advanced-Windows-Exploit-Development-Practice are comparing it to the libraries listed below
Sorting:
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 6 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- ☆15Sep 14, 2022Updated 3 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆21Sep 19, 2019Updated 6 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆21May 29, 2018Updated 7 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated last week
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Aug 18, 2019Updated 6 years ago
- A set of helpers and examples to fuzz Win32 binaries with AFL++ QEMU☆70Mar 19, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Linux kernel modules developed by me for learning purposes☆19Jan 16, 2013Updated 13 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- ☆10Jul 9, 2020Updated 5 years ago
- SanitizerCoverage hooks and coverage reports for user-mode QEMU☆12Nov 3, 2019Updated 6 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Windows Injection 101: from Zero to ROP (HITCON 2017)☆29Aug 27, 2017Updated 8 years ago
- Sensitive and Collaborative Fuzzing with AFL☆27Jul 29, 2019Updated 6 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- Tzer: TVM Implementation of "Coverage-Guided Tensor Compiler Fuzzing with Joint IR-Pass Mutation (OOPSLA'22)“.☆12Jan 15, 2022Updated 4 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Collection of AI and Security Papers☆27Apr 17, 2020Updated 5 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago