melnicek / wpe
ARCHIVED: Use 'peh' instead
☆16Updated 3 years ago
Alternatives and similar repositories for wpe:
Users that are interested in wpe are comparing it to the libraries listed below
- Post exploitation helper☆38Updated last year
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 4 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Updated 4 years ago
- Python template to assist with buffer overflows☆71Updated 5 years ago
- ☆31Updated last year
- ☆18Updated 4 years ago
- ☆27Updated 5 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- OSCP Buffer Overflow in 30 minutes☆35Updated 5 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- Reconnaissance and Enumeration automation script☆52Updated 3 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆61Updated 3 years ago
- Python program to exploit stack-based buffer overflows.☆22Updated 3 years ago
- ☆48Updated 3 years ago
- ☆76Updated 3 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆63Updated 3 years ago
- Don't expect much :) Just expect to learn new things!☆61Updated 3 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- A Python API for Hack the Box platform interaction☆64Updated 4 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆34Updated 5 years ago
- A dump of all the scripts that I make☆19Updated 3 years ago
- 👹☆56Updated 3 years ago
- Shell Please 1.0 : Reverse shell code generator.☆35Updated 2 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆24Updated 4 years ago
- A simple Markdown checklist for Penetration Testing with Kali Linux 2020 course exercises as part of OSCP.☆63Updated 4 years ago
- Suggests programs to run against services found during the enumeration phase of a Pentest☆94Updated last year
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Updated 5 years ago
- Simple script to generate commands to achieve reverse shells.☆116Updated 4 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26Updated 4 years ago
- ☆45Updated 5 months ago