helviojunior / exploitsLinks
☆12Updated 5 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- Some of my presentations and published articles in different conferences☆18Updated 4 years ago
- Random Exploits☆50Updated 2 years ago
- An application to test windows and linux shellcodes☆94Updated last year
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Write-up for the Active Directory Lab I have created for Akerva exhibition stand @ leHACK19 (Paris)☆36Updated 6 years ago
- Pentest stuff☆48Updated 2 years ago
- ☆13Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 5 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆47Updated 5 years ago
- A tool to password spray Jenkins instances☆59Updated 6 years ago
- Runs sshd as a unprivileged user for persistence☆12Updated 6 years ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- ☆57Updated 7 years ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Scripts for OSCE☆18Updated 7 years ago
- Exploit for PlaySMS 1.4 authenticated RCE☆14Updated 7 years ago
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- ☆54Updated 4 years ago
- site source jivoi.github.io☆22Updated 3 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- Deliver powershell paylods via DNS TXT via CloudFlare using PowerShell☆62Updated 6 years ago
- ☆15Updated 4 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- ☆27Updated last year
- ☆66Updated 4 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated last year
- CVE, reports, research☆15Updated 4 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago