mgeeky / Exploit-Development-Tools
A bunch of my exploit development helper tools, collected in one place.
☆140Updated 2 years ago
Alternatives and similar repositories for Exploit-Development-Tools:
Users that are interested in Exploit-Development-Tools are comparing it to the libraries listed below
- Collection of things made during my preparation to take on OSEE☆97Updated 5 years ago
- Linux Rootkits (4.x Kernel)☆82Updated 3 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆65Updated 2 months ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆142Updated 3 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆76Updated 4 years ago
- Custom tools and projects about security☆110Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆60Updated 4 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32Updated 6 years ago
- Fork of mona.py with x64dbg support☆102Updated 2 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆142Updated 3 years ago
- WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift☆33Updated 3 years ago
- ☆36Updated 6 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- DEFCON 27 slides and workshop materials.☆127Updated 4 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Updated 3 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆78Updated 7 years ago
- Helper scripts to assist penetration testing and exploit development☆37Updated 4 months ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 6 years ago
- Fileless lateral movement tool that relies on ChangeServiceConfigA to run command☆112Updated 5 years ago
- A tool to create obfuscated HTA script.☆176Updated 3 years ago
- Scripts I used during CTP☆67Updated 4 years ago
- Windows RID Hijacking persistence technique☆173Updated 4 months ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts usin…☆94Updated 4 years ago
- Just a normal flask web app to understand win32api with code snippets and references.☆72Updated 5 years ago
- Uses Core's Impacket Library to get the password policy from a windows machine☆36Updated last month
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 5 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆68Updated 5 years ago
- How To Execute Shellcode via HTA☆137Updated 7 years ago