mikaelkall / vulnLinks
Project to practice the basic at exploit bufferoverflow bugs.
☆11Updated 8 years ago
Alternatives and similar repositories for vuln
Users that are interested in vuln are comparing it to the libraries listed below
Sorting:
- \ PowerAvails Powershell /☆10Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- ☆21Updated 6 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45Updated 6 years ago
- Windows 10 Exploit☆30Updated 7 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33Updated last year
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- ☆11Updated 8 years ago
- Scripts for OSCE☆18Updated 7 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Communicate with a remote shell easily☆12Updated 8 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 6 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- ☆16Updated 10 years ago
- ☆12Updated 8 years ago
- AV Bypass☆29Updated 8 years ago
- ☆21Updated 6 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆27Updated 9 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Group Policy Hijacking☆32Updated 7 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆48Updated 8 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆56Updated last year
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆42Updated 7 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Updated 4 years ago
- Repo for proof of concept exploits and tools.☆56Updated 5 years ago
- Enumerate subdomains through Virustotal☆32Updated 6 years ago