linuxjustin / Pentest
☆7Updated 7 years ago
Alternatives and similar repositories for Pentest:
Users that are interested in Pentest are comparing it to the libraries listed below
- Solutions for http://hackthiscontract.io☆8Updated 7 years ago
- shell backdoor website☆9Updated 6 years ago
- Kindly Win x86/x64 DLL Injector☆16Updated 5 years ago
- ☆30Updated 8 years ago
- linux rootkit☆157Updated 6 years ago
- Fake AccessPoint Attack☆30Updated 6 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- miscellaneous handy pentesting tools☆64Updated 4 years ago
- ~ BannerGrab☆26Updated 8 years ago
- NTPD remote DOS exploit and vulnerable container☆23Updated 7 years ago
- #HackingTogether☆13Updated 8 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago
- ☆93Updated 6 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆116Updated 2 months ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆40Updated 10 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 8 years ago
- Helper script for working with format string bugs☆57Updated 4 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- JavaScript Reversed TCP Meterpreter Stager☆136Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆21Updated 9 years ago
- ☆26Updated 9 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆70Updated 8 years ago
- put this here because archival reasons.☆28Updated 6 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- original cve-2013-2094 exploit and a rewritten version for educational purposes☆90Updated 11 years ago
- 🏴 Collection of CTF solutions☆76Updated 5 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆84Updated 5 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆123Updated 6 years ago