hvictor / targetserv-x64Links
Windows x64 Exploitation Training
☆15Updated 7 months ago
Alternatives and similar repositories for targetserv-x64
Users that are interested in targetserv-x64 are comparing it to the libraries listed below
Sorting:
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆52Updated 2 years ago
- vulnerable windows binaries for exploitation practice☆49Updated 3 years ago
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆43Updated last year
- Bypass user-land hooks by syscall tampering via the Trap Flag☆138Updated 5 months ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- Sleep obfuscation in golang based on ekko☆13Updated 2 years ago
- ☆28Updated 3 years ago
- Find DLLs with RWX section☆80Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 10 months ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆105Updated 2 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆48Updated 5 years ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆194Updated last year
- Python3 rewrite of AsOutsider features of AADInternals☆59Updated 6 months ago
- Simple BOF to read the protection level of a process☆119Updated 2 years ago
- ☆12Updated 2 years ago
- Internal Monologue BOF☆79Updated last year
- Local & remote Windows DLL Proxying☆169Updated last year
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆20Updated 3 years ago
- ☆29Updated last year
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆17Updated 6 months ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆123Updated last year
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆118Updated last year
- Mockingjay process self injection POC☆43Updated 2 years ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆45Updated last year
- A hoontr must hoont☆101Updated 2 months ago
- Rusty Impersonate☆103Updated 3 months ago
- Slides for COM Hijacking AV/EDR Talk on 38c3☆74Updated last year
- ☆109Updated 11 months ago
- Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By f…☆324Updated 3 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated 2 years ago