Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.
☆209Oct 5, 2022Updated 3 years ago
Alternatives and similar repositories for expdevBadChars
Users that are interested in expdevBadChars are comparing it to the libraries listed below
Sorting:
- JavaScript Reversed TCP Meterpreter Stager☆138May 25, 2017Updated 8 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,505Aug 1, 2023Updated 2 years ago
- Constrained Language Mode + AMSI bypass all in one☆157Jul 29, 2019Updated 6 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆145Oct 24, 2021Updated 4 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,068Apr 26, 2020Updated 5 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆252Sep 27, 2023Updated 2 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆200Nov 19, 2017Updated 8 years ago
- ☆272Jul 26, 2022Updated 3 years ago
- CScriptShell, a Powershell Host running within cscript.exe☆162Apr 11, 2017Updated 8 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆32Aug 29, 2016Updated 9 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- The full story of the CLR implementation of Meterpreter☆153Jul 29, 2020Updated 5 years ago
- Collection of things made during my preparation to take on OSCE☆189Feb 24, 2022Updated 4 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆526Apr 14, 2023Updated 2 years ago
- Collection of scripts for interacting with AD Kerberos from Linux☆72Apr 22, 2018Updated 7 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆326Apr 26, 2020Updated 5 years ago
- RottenPotato local privilege escalation from service account to SYSTEM☆691Dec 29, 2017Updated 8 years ago
- Check-LocalAdminHash is a PowerShell tool that attempts to authenticate to multiple hosts over either WMI or SMB using a password hash to…☆180Sep 11, 2023Updated 2 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆382Nov 2, 2017Updated 8 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 8 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,917Sep 7, 2020Updated 5 years ago
- A shellcode writing toolkit☆685Jun 30, 2025Updated 8 months ago
- Automate AV evasion by calling AMSI☆88May 31, 2023Updated 2 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆496Sep 21, 2021Updated 4 years ago
- A TCP proxy over named pipes. Originally created for maintaining a meterpreter session over 445 for less network alarms.☆243Sep 13, 2021Updated 4 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago
- Inline file transfer using in-built Windows tools (DEBUG.exe or PowerShell).☆316Apr 27, 2020Updated 5 years ago