mgeeky / expdevBadCharsLinks
Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.
☆208Updated 3 years ago
Alternatives and similar repositories for expdevBadChars
Users that are interested in expdevBadChars are comparing it to the libraries listed below
Sorting:
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆259Updated 4 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- A code demonstrating CVE-2018-0886☆268Updated 5 years ago
- Local UNIX PrivEsc Aggregation☆244Updated 9 years ago
- Linux post exploitation enumeration and exploit checking tools☆182Updated 5 years ago
- A PowerShell example of the Windows zero day priv esc☆328Updated 7 years ago
- Exploits and advisories☆203Updated 3 months ago
- Used for the osce exam preparation☆74Updated 9 years ago
- UAC 0day, all day!☆281Updated 8 years ago
- An exploit for Apache Struts CVE-2018-11776☆302Updated 7 years ago
- This version of PowerUp is now unsupported. See https://github.com/Veil-Framework/PowerTools/tree/master/PowerUp for the most current ver…☆250Updated 8 years ago
- PoC code for CVE-2019-0841 Privilege Escalation vulnerability☆240Updated 6 years ago
- ☆261Updated 8 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆83Updated 7 years ago
- Search Exploitable Software on Linux☆232Updated 2 years ago
- A client compatible with Metasploit's staging protocol☆263Updated 8 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆380Updated 2 years ago
- Pip install exploit package☆157Updated 6 years ago
- Windows Pentest Scripts☆233Updated 7 years ago
- ntlm relay attack to Exchange Web Services☆334Updated 7 years ago
- Linux Privilege Escalation Tool☆185Updated 6 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆261Updated 2 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Updated 9 years ago
- Inline file transfer using in-built Windows tools (DEBUG.exe or PowerShell).☆317Updated 5 years ago
- The Hacker Playbook 3 - Web Commands☆85Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆590Updated 4 years ago
- ☆128Updated 9 years ago
- ☆208Updated 4 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆329Updated 2 years ago
- APT34/OILRIG leak☆233Updated 6 years ago