☆36Jul 11, 2018Updated 7 years ago
Alternatives and similar repositories for Windows_Kernel_Sploit_List
Users that are interested in Windows_Kernel_Sploit_List are comparing it to the libraries listed below
Sorting:
- Setup Kali XFCE version with some hi-dpi friendly style☆32Jul 13, 2019Updated 6 years ago
- rev shell and manager in go☆20Feb 25, 2020Updated 6 years ago
- Public repository for HEVD exploits☆19Jun 26, 2018Updated 7 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago
- Mimipenguin密码抓取神器☆26Sep 9, 2017Updated 8 years ago
- ☆13Feb 22, 2022Updated 4 years ago
- Noob Penetration tester☆11Jul 17, 2025Updated 7 months ago
- ☆14May 30, 2018Updated 7 years ago
- Pentesting/Bugbounty Dockerfiles.☆176May 29, 2021Updated 4 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Dec 18, 2017Updated 8 years ago
- Overview of Microsoft Patch Tuesday☆14Sep 13, 2024Updated last year
- Pwn2Win CTF 2019 flag submissions☆14May 28, 2020Updated 5 years ago
- Binary Ninja plugin for forward/backward slicing☆18Nov 25, 2020Updated 5 years ago
- Script will enumerate domain name using horizontal enumeration, reverse lookup. Each horziontal domain will then be vertically enumerated…☆31Aug 2, 2019Updated 6 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Jun 26, 2019Updated 6 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- A simple AES malware crypter☆16Mar 16, 2018Updated 7 years ago
- Oh My Tmux! My pretty + versatile tmux configuration that just works (imho the best tmux configuration)☆15Feb 8, 2021Updated 5 years ago
- ReaCOM has got a lot of tools to use and is related to component object model☆74Feb 3, 2020Updated 6 years ago
- Fast and easy script to manage pentesting training apps☆380Feb 17, 2024Updated 2 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆84Jan 6, 2023Updated 3 years ago
- Vulnerable rails application that is configurable in its vulnerability☆20Jun 4, 2018Updated 7 years ago
- My walkthrough of the LPEWorkshop exercises☆36Aug 17, 2020Updated 5 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Jun 10, 2023Updated 2 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Sep 2, 2020Updated 5 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26May 1, 2020Updated 5 years ago
- Extract data of TTD trace file to a minidump☆31Jul 31, 2023Updated 2 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- Miscellaneous pentesting scripts for OSCP☆59Dec 3, 2018Updated 7 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Mar 29, 2022Updated 3 years ago
- ☆23Nov 2, 2021Updated 4 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 8 years ago
- ☆28Apr 1, 2018Updated 7 years ago
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆20Jun 19, 2020Updated 5 years ago
- Windows Process Injection Toolkit - plain and simple :)☆28Jul 29, 2018Updated 7 years ago
- ☆97Feb 18, 2025Updated last year