linuxjustin / Pentest
☆7Updated 7 years ago
Alternatives and similar repositories for Pentest:
Users that are interested in Pentest are comparing it to the libraries listed below
- Solutions for http://hackthiscontract.io☆8Updated 7 years ago
- shell backdoor website☆9Updated 6 years ago
- Kindly Win x86/x64 DLL Injector☆16Updated 5 years ago
- Fake AccessPoint Attack☆30Updated 6 years ago
- ☆31Updated 8 years ago
- linux rootkit☆159Updated 7 years ago
- windows kernel vulnerability found by me☆90Updated 7 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 8 years ago
- Published vulnerabilities and exploits.☆56Updated 2 years ago
- Writeups for CTF competitions.☆32Updated 8 years ago
- ☆21Updated 3 years ago
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆118Updated 5 months ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- CTF collaboration tool for teams☆11Updated 7 years ago
- miscellaneous handy pentesting tools☆63Updated 4 years ago
- Exploits for interesting CTF challenges I have worked on☆64Updated 8 years ago
- Enhanced Meta File Fuzzer based on Peach Fuzzing Framework☆72Updated 8 years ago
- ☆137Updated 3 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- Dlink DIR 615 Exploit☆19Updated 9 years ago
- ☆46Updated 8 years ago
- Python In The Middle : a Python implementation of MITM attacks.☆15Updated 10 years ago
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆64Updated 7 years ago
- Network based protocol fuzzer☆71Updated 3 years ago
- Black Hat 2016 Slides, Paper and Code☆83Updated 8 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- Exploit collection for NT privilege escalation☆66Updated 9 years ago
- Some kernel exploits☆144Updated 7 years ago
- Linux rootkit and detection examples☆32Updated 9 years ago