kmkz / ExploitsLinks
Exploits and advisories
☆207Updated 3 weeks ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- BlueKeep scanner supporting NLA☆166Updated 6 years ago
- Used for the osce exam preparation☆74Updated 9 years ago
- How To Execute Shellcode via HTA☆141Updated 7 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆82Updated 7 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- APT34/OILRIG leak☆232Updated 6 years ago
- PoC code for CVE-2019-0841 Privilege Escalation vulnerability☆241Updated 6 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆208Updated 8 years ago
- JavaScript Reversed TCP Meterpreter Stager☆138Updated 8 years ago
- PowerDNS: Powershell DNS Delivery☆214Updated 7 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 6 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- MS17-010☆63Updated 8 years ago
- PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE☆250Updated 5 years ago
- The full story of the CLR implementation of Meterpreter☆153Updated 5 years ago
- Encode powershell payload into bat files☆155Updated 7 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆116Updated 9 years ago
- OFFICE DDEAUTO Payload Generation script☆128Updated 5 years ago
- Meterpreter_Payload_Detection.exe tool for detecting Meterpreter in memory like IPS-IDS and Forensics tool☆165Updated 2 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- ☆230Updated 7 years ago
- A PowerShell example of the Windows zero day priv esc☆328Updated 7 years ago
- GodOfWar - Malicious Java WAR builder with built-in payloads☆126Updated 6 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 6 years ago
- Domain user enumeration tool☆216Updated 2 years ago
- CVE-2019-0604☆133Updated 6 years ago
- Aggregation of Cobalt Strike's aggressor scripts.☆142Updated 7 years ago
- Constrained Language Mode + AMSI bypass all in one☆159Updated 6 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Updated 7 years ago
- A library for integrating communication channels with the Cobalt Strike External C2 server☆289Updated 8 years ago