michael-catanzaro / StackAttackLinks
Python program to exploit stack-based buffer overflows.
☆22Updated 4 years ago
Alternatives and similar repositories for StackAttack
Users that are interested in StackAttack are comparing it to the libraries listed below
Sorting:
- Shell Please 1.0 : Reverse shell code generator.☆35Updated 2 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago
- ☆81Updated 5 years ago
- 👹☆56Updated 3 years ago
- Scripts to create a Active Directory Lab with security misconfigurations and vulnerabilities.☆48Updated 5 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 3 years ago
- Don't expect much :) Just expect to learn new things!☆62Updated 4 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Updated 4 years ago
- A simple Markdown checklist for Penetration Testing with Kali Linux 2020 course exercises as part of OSCP.☆63Updated 5 years ago
- Everyone's favorite SMB/SAMBA/CIFS enumeration tool ported over to Python.☆85Updated 3 years ago
- Python template to assist with buffer overflows☆71Updated 5 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆62Updated 5 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆70Updated 11 months ago
- ☆76Updated 4 years ago
- ☆27Updated 5 years ago
- ☆32Updated last year
- ☆28Updated 4 years ago
- Buffer Overflows☆29Updated 4 years ago
- ☆31Updated 4 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 4 years ago
- ☆63Updated 4 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated last year
- ☆30Updated 3 years ago
- ☆48Updated 3 years ago
- Ultimate File Transfer List☆62Updated 2 years ago
- Post exploitation helper☆38Updated 2 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆31Updated 5 years ago
- Some of the best web shells that you might need☆45Updated 6 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Updated 4 years ago
- ☆79Updated 5 years ago