lucyoa / exploits
☆12Updated 5 years ago
Alternatives and similar repositories for exploits:
Users that are interested in exploits are comparing it to the libraries listed below
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- ☆10Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- ☆11Updated 6 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- ☆11Updated 7 years ago
- ☆16Updated 9 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Format string exploit generation☆10Updated 9 years ago
- PowerShell Module Bindings for Capstone/Keystone☆24Updated 8 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- ☆25Updated 6 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 6 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Updated 8 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Fuzzing Framework☆10Updated 7 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 9 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 6 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Updated 4 years ago
- Create COM Objects backed by Scripts, not DLLs☆9Updated 7 years ago