njahrckstr / Windows_Kernel_Sploit_ListLinks
☆36Updated 7 years ago
Alternatives and similar repositories for Windows_Kernel_Sploit_List
Users that are interested in Windows_Kernel_Sploit_List are comparing it to the libraries listed below
Sorting:
- Alphanumeric Encoder☆25Updated 7 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Tools that I've created/used during CTP-OSCE☆10Updated 6 years ago
- Scripts I used during CTP☆68Updated 5 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- ☆25Updated 5 years ago
- ☆53Updated last year
- CTF Writeups☆26Updated 6 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆33Updated 8 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Updated 6 years ago
- ☆22Updated 8 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆75Updated 2 months ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 7 years ago
- ☆23Updated 4 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32Updated 7 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 6 years ago
- gtfo, now with the speed of golang☆62Updated 5 years ago
- ☆53Updated 6 years ago
- miscellaneous stuff☆21Updated 10 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- My python3 implementation of a Forward Shell☆36Updated 6 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- Random source codes☆25Updated last month
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 8 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated 11 months ago
- Different code-injections techniques under a common tool☆30Updated 5 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago