nekocode / win_penetrationView external linksLinks
Penetration testing on windows(7 or 8)
☆25Oct 21, 2020Updated 5 years ago
Alternatives and similar repositories for win_penetration
Users that are interested in win_penetration are comparing it to the libraries listed below
Sorting:
- utilities☆15Jul 2, 2013Updated 12 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Dumping ground for whatever IDA Pro scripts I write☆16Oct 9, 2016Updated 9 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- scrapy+selenium+phantomjs做的微信采集,遇见验证码发到打码平台☆11Feb 2, 2017Updated 9 years ago
- A GCC plugin implementing various stack canaries.☆14Sep 7, 2012Updated 13 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- Parses Nmap XML files☆25Apr 29, 2015Updated 10 years ago
- Clickjacking Proof-of-Concept Exploit☆25Oct 1, 2020Updated 5 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69May 7, 2016Updated 9 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- A CSRF guard hiding extension that keeps track of the latest guard value per session and update new requests accordingly☆18Oct 7, 2015Updated 10 years ago
- DNS TCP to UDP proxy☆10Jul 19, 2015Updated 10 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- A 512-byte bootloader displaying ASCII Goatse on boot.☆29Apr 23, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- Simple, hand-picked list of fuzz strings☆34Nov 5, 2016Updated 9 years ago
- Unix remote login tool, rootkit shell tool☆32Jun 11, 2015Updated 10 years ago
- Inject codes to another process to watch and operate other process. This is usually used as anti-virus software.☆15Sep 19, 2015Updated 10 years ago
- An implementation of an extension of the Local Descriptors Encoded by Fisher Vectors method for person re-identification.☆13Nov 30, 2014Updated 11 years ago
- A couple of little tools I've made for working with Windows Drivers☆15Jan 18, 2016Updated 10 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Aug 25, 2014Updated 11 years ago
- library and intepreter for penetration testing tools☆30Apr 10, 2016Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Feb 21, 2016Updated 9 years ago
- A hidden android SMS interceptor that forwards every message☆21Jul 5, 2023Updated 2 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Ntdll Unhooking POC☆19Aug 12, 2022Updated 3 years ago
- The long shadow to emerge as other Git repositories☆18Jul 8, 2024Updated last year
- Solutions to crackmes☆19May 22, 2015Updated 10 years ago