rayhan0x01 / reverse-shell-able-exploit-pocsLinks
Reverse Shell-able Windows exploits short POCs.
☆31Updated 4 years ago
Alternatives and similar repositories for reverse-shell-able-exploit-pocs
Users that are interested in reverse-shell-able-exploit-pocs are comparing it to the libraries listed below
Sorting:
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- Preparation for OSWE☆42Updated 5 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 4 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆45Updated 10 years ago
- ☆31Updated 4 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆43Updated 4 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆44Updated 11 months ago
- ☆81Updated 5 years ago
- Penetration Test Methodology☆17Updated last month
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆81Updated 3 years ago
- ☆29Updated 4 years ago
- This repo will contain some basic pentest/RT commands.☆38Updated 3 years ago
- Windows Kernel Exploits☆66Updated 7 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- OSWE Preparation☆37Updated 6 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆41Updated last year
- https://alvinsmith.gitbook.io/progressive-oscp/☆40Updated 2 months ago
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated last year
- A shot code to Bypass UAC in Windows.☆26Updated 3 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- A list of "secrets" from JWT sample code and readme files.☆55Updated 4 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆29Updated 6 years ago
- A simple, LFI vulnerable PHP application☆18Updated 6 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆31Updated 5 years ago
- Offensive Security Wireless Professional☆17Updated 5 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- Notes for CRTP☆40Updated 4 years ago
- ☆37Updated 5 years ago
- This is to reorganize my notes☆10Updated 4 years ago
- Review of AWAE.OSWE☆31Updated 3 years ago