Exploitation Tool For Windows Using Batch and Powershell
☆21Dec 2, 2024Updated last year
Alternatives and similar repositories for BatSploit
Users that are interested in BatSploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆24May 8, 2018Updated 8 years ago
- Python Pentest Tools☆22Dec 22, 2025Updated 4 months ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- A web spider for shodan.io without using the Developer API.☆34Jan 4, 2018Updated 8 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Discover "HotSpots" - potential spots for credentials theft☆24Apr 12, 2018Updated 8 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Apr 18, 2015Updated 11 years ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆82Jun 5, 2018Updated 7 years ago
- An agent that performs user actions on a workstation☆13Jan 22, 2018Updated 8 years ago
- My pentest tools used two years ago.☆22May 11, 2017Updated 9 years ago
- Simple high-interactive client honeypot☆25Oct 15, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Scripts and code example about penetration testing, web, network and exploiting wireless devices.☆11Jun 24, 2018Updated 7 years ago
- Small backdoor using cookie.☆63Oct 18, 2016Updated 9 years ago
- Open-source Exploiting Framework☆32Mar 13, 2017Updated 9 years ago
- G-Surge☆10Feb 7, 2018Updated 8 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Arduino+Si5351 = Antenna/Network Analyzer☆13Feb 10, 2019Updated 7 years ago
- ☆13Oct 14, 2016Updated 9 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 9 years ago
- ☆12May 5, 2026Updated 2 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Small and highly portable detection tests.☆13Apr 13, 2018Updated 8 years ago
- Python Script Obfuscator☆10Nov 20, 2014Updated 11 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆94Feb 19, 2018Updated 8 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆12Jan 10, 2020Updated 6 years ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- buffer overflow examples☆24Dec 20, 2017Updated 8 years ago
- Avoidz tool to bypass most A.V softwares☆140Sep 28, 2017Updated 8 years ago
- Shellcode异或加密工具☆11Mar 23, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SafeInit protects software from uninitialized read vulnerabilities - code released for NDSS 2017☆26May 5, 2021Updated 5 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 6 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- ☆23Mar 28, 2021Updated 5 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 9 years ago
- Phishing webapp generator☆43Aug 17, 2018Updated 7 years ago