hvictor / targetserv-x64Links
Windows x64 Exploitation Training
☆15Updated last month
Alternatives and similar repositories for targetserv-x64
Users that are interested in targetserv-x64 are comparing it to the libraries listed below
Sorting:
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆47Updated last year
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆142Updated 11 months ago
- IoctlHunter is a command-line tool designed to simplify the analysis of IOCTL calls made by userland software targeting Windows drivers.☆103Updated last year
- vulnerable windows binaries for exploitation practice☆41Updated 3 years ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated last week
- ☆110Updated 6 months ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆119Updated last year
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆15Updated 3 years ago
- ☆12Updated 2 years ago
- Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies☆120Updated last year
- Simple BOF to read the protection level of a process☆115Updated 2 years ago
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆42Updated last year
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆83Updated 10 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- Mockingjay process self injection POC☆35Updated last year
- ☆29Updated 10 months ago
- ☆136Updated 2 years ago
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆77Updated 4 months ago
- A Mythic Agent written in PIC C.☆190Updated 5 months ago
- IronSharpPack is a repo of popular C# projects that have been embedded into IronPython scripts that execute an AMSI bypass and then refle…☆115Updated last year
- ☆107Updated 4 months ago
- Find DLLs with RWX section☆81Updated 2 years ago
- ☆70Updated 4 months ago
- Rusty Impersonate☆97Updated 2 years ago
- Sleep obfuscation in golang based on ekko☆11Updated last year
- ☆89Updated 2 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 3 months ago
- A version of NetLoader, Execute Assemblies and Bypass ETW and AMSI using Hardware Breakpoints☆99Updated this week
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆99Updated 3 years ago
- Brief writeup of post exploitation methodologies.☆18Updated last year