njahrckstr / Windows_Kernel_Sploit_ListLinks
☆36Updated 6 years ago
Alternatives and similar repositories for Windows_Kernel_Sploit_List
Users that are interested in Windows_Kernel_Sploit_List are comparing it to the libraries listed below
Sorting:
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 5 years ago
- ☆25Updated 4 years ago
- Tools that I've created/used during CTP-OSCE☆10Updated 5 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 7 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 8 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆36Updated 5 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Updated 5 years ago
- ☆21Updated 8 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Alphanumeric Encoder☆25Updated 6 years ago
- ☆1Updated 6 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Updated 5 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 6 years ago
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- public exploits☆35Updated 2 years ago
- Collection of things made during my preparation to take on OSEE☆97Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- ☆11Updated 2 years ago
- ☆9Updated 8 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆66Updated 3 months ago
- Basic tool to automate backdooring PE files☆55Updated 3 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 6 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- Use bitsadmin to maintain persistence and bypass Autoruns☆66Updated 7 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 11 months ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆32Updated 6 years ago
- ☆23Updated 4 years ago