nop-tech / Pentesting
My Collection of exploits, reverse shells, scripts and more
☆12Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Pentesting
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆43Updated 4 years ago
- ☆46Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆64Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆23Updated 2 years ago
- Crackmapexec custom scripts used in my internal pentests.☆25Updated last year
- 「🚪」Linux Backdoor based on ICMP protocol☆60Updated 8 months ago
- ☆82Updated 2 years ago
- A small red team course☆32Updated last year
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆27Updated last year
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆27Updated 2 years ago
- PowerJoker is a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.☆35Updated 7 months ago
- Malicious powershell scripts loader designed to avoid detection.☆36Updated last year
- ☆25Updated 2 years ago
- Creating a Malicious Macro using MS Word☆17Updated 2 years ago
- Code dump from PEN-300/OSEP updated 2022☆40Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆65Updated 8 months ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆47Updated 2 years ago
- ☆25Updated 2 months ago
- Crack Everything for CrackMapExec version 6☆16Updated 4 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated last year
- User enumeration and password spraying tool for testing Azure AD☆68Updated 2 years ago
- Brief writeup of post exploitation methodologies.☆17Updated last year
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆37Updated last year
- Python3 Ebowla... 3Bowla☆17Updated 4 years ago
- ☆12Updated 4 years ago
- ☆25Updated last year