Python program to exploit stack-based buffer overflows.
☆22Feb 24, 2021Updated 5 years ago
Alternatives and similar repositories for StackAttack
Users that are interested in StackAttack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- Shell Please 1.0 : Reverse shell code generator.☆36Jul 3, 2022Updated 3 years ago
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆100May 25, 2021Updated 4 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Nov 21, 2020Updated 5 years ago
- Useful scripts for autokey☆29Oct 28, 2020Updated 5 years ago
- Unofficial list of approved tools for OSCP☆28Apr 25, 2023Updated 2 years ago
- ☆23Jul 5, 2020Updated 5 years ago
- ☆168Oct 21, 2023Updated 2 years ago
- A tool to generate malicious .deb files☆18Mar 6, 2018Updated 8 years ago
- Buffer Overflows☆28Jan 30, 2021Updated 5 years ago
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆14Jun 11, 2025Updated 9 months ago
- ☆75Mar 24, 2021Updated 5 years ago
- Template project for Offensive Security Exam Documentation☆12Feb 25, 2020Updated 6 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- ☆10Feb 21, 2022Updated 4 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Apr 10, 2020Updated 5 years ago
- A Nim library to generate random numbers and random ranges of bytes using the system's PRNG.☆12Oct 3, 2018Updated 7 years ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- Tutorial session from PyData London, Fri 6 May 2016☆11May 6, 2016Updated 9 years ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- wew oscp☆281Jun 28, 2022Updated 3 years ago
- My experiences with Virtual Hacking Labs☆12Feb 7, 2020Updated 6 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- ☆15Sep 11, 2020Updated 5 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆63Jul 15, 2021Updated 4 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 6 years ago
- Modula-2 to C# Translator and Compiler☆14Jun 5, 2023Updated 2 years ago
- ☆14Dec 2, 2020Updated 5 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Jul 9, 2020Updated 5 years ago
- My attempt at weaponizing Discord.☆18Apr 13, 2022Updated 3 years ago
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated last month
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- ☆18Jun 18, 2021Updated 4 years ago
- Coursera Course Symmetric Cryptography 🔑 part of Introduction to Applied Cryptography Specialization.☆17Sep 14, 2020Updated 5 years ago
- Nim module which provides clean, zero-effort command line parsing☆16Oct 7, 2021Updated 4 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Dec 19, 2021Updated 4 years ago