jivoi / bovrflow
buffer overflow examples
☆22Updated 7 years ago
Alternatives and similar repositories for bovrflow:
Users that are interested in bovrflow are comparing it to the libraries listed below
- only for 31337☆22Updated 8 years ago
- ☆12Updated 4 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 7 years ago
- ☆34Updated 2 months ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Free Email Providers☆10Updated last year
- Random code snippets☆9Updated last year
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 4 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆14Updated 5 years ago
- Brute Force and Scan WinRm Service☆13Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- home! sweet home☆23Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- ☆16Updated 6 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆19Updated 2 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 5 years ago