Exploits developped by Outflank B.V. team members
☆21Jan 26, 2017Updated 9 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- A PowerShell script to parse the docx/docm file format and update the template location.☆17Oct 15, 2019Updated 6 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- LNK to JSON☆14Mar 7, 2019Updated 7 years ago
- reducing the entropy of your payload☆11Aug 15, 2022Updated 3 years ago
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- Clean public password dump files and store in ELK☆36Jan 24, 2018Updated 8 years ago
- An 💦 orgasmic 💦 Python library for the Docker Engine API 🥵☆13Jan 13, 2024Updated 2 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- Some random exploits that may or may not be useful. Not responsible for misuse.☆21Dec 12, 2018Updated 7 years ago
- Software exploitation training material☆16Jun 8, 2017Updated 8 years ago
- Notes on offensive training☆16Nov 29, 2017Updated 8 years ago
- isodump - ISO dump utility☆41Jun 9, 2019Updated 6 years ago
- A tool to password spray Jenkins instances☆60May 28, 2019Updated 6 years ago
- A tiny tool to identify and remediate common misconfigurations in Active Directory Certificate Services☆27May 28, 2025Updated 9 months ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Mar 1, 2019Updated 7 years ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Apr 27, 2025Updated 10 months ago
- libssh CVE-2018-10933☆22Oct 20, 2018Updated 7 years ago
- Sniffs sensitive data from interface or pcap☆14Feb 19, 2018Updated 8 years ago
- Miscellaneous tools for BloodHound☆19Jan 26, 2022Updated 4 years ago
- ☆34Feb 26, 2015Updated 11 years ago
- ☆21Aug 19, 2017Updated 8 years ago
- ☆18Jul 4, 2019Updated 6 years ago
- Lab exercises to practice privilege escalation scenarios in AWS IAM. These exercises and the slides go through the basics behind AWS IAM,…☆16Oct 31, 2019Updated 6 years ago
- A few quick recipes for those that do not have much time during the day☆22Oct 28, 2024Updated last year
- A nodejs web application honeypot☆47Aug 23, 2015Updated 10 years ago
- OCaml implementation of Fiat-Shamir Zero Knowledge Proof system as a client/server authentication protocol☆12Feb 7, 2017Updated 9 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆32Nov 11, 2014Updated 11 years ago
- Web版webshell☆12Jan 27, 2018Updated 8 years ago
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆41Jun 19, 2019Updated 6 years ago
- C++实现键盘记录器☆10Sep 15, 2014Updated 11 years ago
- android-sms2csv.py extract SMS messages from Android backup files☆13Jun 19, 2020Updated 5 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- ☆13Jan 19, 2024Updated 2 years ago
- Proof of concept code to exploit CVE-2020-12116: Unauthenticated arbitrary file read on ManageEngine OpManger.☆32May 8, 2020Updated 5 years ago
- Integration between SIEMs and TAXII services☆10Mar 2, 2023Updated 3 years ago