nekocode / win_penetrationLinks
Penetration testing on windows(7 or 8)
☆25Updated 4 years ago
Alternatives and similar repositories for win_penetration
Users that are interested in win_penetration are comparing it to the libraries listed below
Sorting:
- A wrapper tool for shadowsocks to consistently bypass firewalls.☆82Updated 7 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Updated 8 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- cross site scripting framework plugin for metasploit☆17Updated 13 years ago
- CVE-2017-9791☆27Updated 8 years ago
- Code, commands, and chatter about Threat Hunting.☆35Updated 5 years ago
- "HeaderScan" Burp Plugin☆16Updated 11 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- MAC Address Org Auto-Detection☆33Updated 8 years ago
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Updated 4 years ago
- Web Exploitation Framework - Beta Release☆24Updated 10 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- Try various exploits to get root☆19Updated 11 years ago
- source&exe☆37Updated 8 years ago
- a GUI for Sqlmap written in python☆38Updated 11 years ago
- ☆12Updated 8 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- ☆41Updated 8 years ago
- Add my own POC to test Visual Studio trick to run code when building☆21Updated 8 years ago
- penetration testing framework that can use socks4/socks5 proxy.☆54Updated 10 years ago
- Check dns servers for reverse resolving private ips☆40Updated 7 years ago
- ☆20Updated last year
- ☆54Updated 8 years ago
- eqgrp-auction decrypted☆12Updated 8 years ago
- Exploit kit analyzer☆22Updated 10 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- [Windows] Local Privilege Escalation - WebClient☆58Updated 8 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 8 years ago
- This version touches disk for registry persistence.☆26Updated 9 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30Updated 9 years ago