pwmoore / CorelanExploitTutorials
My solutions in Python for Corelan's Exploit Writing Tutorials
☆12Updated 8 years ago
Alternatives and similar repositories for CorelanExploitTutorials:
Users that are interested in CorelanExploitTutorials are comparing it to the libraries listed below
- Useful Windows and AD tools☆15Updated 3 years ago
- \ PowerAvails Powershell /☆12Updated 6 years ago
- Mimikatz HashClash☆12Updated 10 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Fuzzing Framework☆10Updated 7 years ago
- ☆16Updated 10 years ago
- ☆25Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- Cobalt Strike log state tracking, parsing, and storage☆24Updated 5 years ago
- ☆10Updated 7 years ago
- ☆30Updated 6 years ago
- ☆17Updated 7 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- ADD/SUB encoder for alphanumeric shellcode☆9Updated 5 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- ☆13Updated 3 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Updated 5 years ago
- ☆17Updated 6 years ago
- CVE-2018-18368 SEP Manager EoP Exploit☆17Updated 5 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Mainframe bruter and screen automation utility.☆19Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- ☆11Updated 6 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- A Tool for cross-platform System Enumeration☆12Updated 8 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 6 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 10 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago