helviojunior / exploitsLinks
☆12Updated 5 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- Some of my presentations and published articles in different conferences☆18Updated 3 years ago
- ☆13Updated 2 years ago
- Runs sshd as a unprivileged user for persistence☆12Updated 6 years ago
- Random Exploits☆50Updated 2 years ago
- An application to test windows and linux shellcodes☆92Updated 10 months ago
- Windows Reverse TCP backdoor☆29Updated 6 years ago
- ☆15Updated 4 years ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆35Updated 5 years ago
- Rest API Client to automate Nessus Scanning☆25Updated 2 years ago
- Pentest stuff☆49Updated last year
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- site source jivoi.github.io☆22Updated 2 years ago
- sqlmap tamper script for unicode escape inside json☆13Updated 6 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 6 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Updated 5 years ago
- Unique wordlist generator of unique wordlists.☆42Updated 2 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 10 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Security checks for your researches☆34Updated 4 years ago
- XXE Injection Payloads☆28Updated 6 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Updated 6 years ago
- Subdomain Enumeration and Scanner☆33Updated 5 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 5 years ago
- ☆28Updated last year
- A tool to password spray Jenkins instances☆57Updated 6 years ago