ricardojoserf / Portswigger-LabsView external linksLinks
All Apprentice and Practitioner-level Portswigger labs
☆31May 18, 2023Updated 2 years ago
Alternatives and similar repositories for Portswigger-Labs
Users that are interested in Portswigger-Labs are comparing it to the libraries listed below
Sorting:
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 10 months ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆23Mar 31, 2019Updated 6 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Parser of the industrial protocol S7 (S7comm) using Libpcap☆12May 1, 2020Updated 5 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 4 years ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆27Apr 13, 2025Updated 10 months ago
- Script to extract the cached credentials from SSSD, getting Active Directory credentials from Unix systems☆23Jun 14, 2023Updated 2 years ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated 10 months ago
- This repository contains my writeups for the labs in PortSwigger's Web Security Academy platform. Each lab writeup includes the lab's nam…☆104Jul 14, 2025Updated 7 months ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆81Jan 26, 2026Updated 3 weeks ago
- ☆30Mar 2, 2023Updated 2 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63May 29, 2023Updated 2 years ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆59Jul 13, 2025Updated 7 months ago
- BypassCredGuard CS BOF☆49Jan 23, 2025Updated last year
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 4 years ago
- Session material from my conference presentation at Live360\Techmentor in Orlando,November 2023☆11Nov 14, 2023Updated 2 years ago
- Get a number of your tweets from the Twitter API.☆13May 1, 2022Updated 3 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- Discord Webhook Cannon is a C# multithreaded, open-source Discord Webhook flooder. It can be used to flood webhooks which are used in mal…☆10Mar 14, 2021Updated 4 years ago
- Null-free shellcode for running calc.exe on Windows x64☆13Mar 24, 2024Updated last year
- DNSCat PNG Extractor is a Python tool designed for the extraction of PNG image data from DNS exfiltration attempts using DNScat☆10Nov 15, 2023Updated 2 years ago
- Bulk indicator VirusTotal lookups supporting file hashes, domains and IPs.☆12May 28, 2025Updated 8 months ago
- Solutions from @PortSwigger labs☆12Apr 11, 2024Updated last year
- ☆12Feb 9, 2025Updated last year
- Register-based VM as C library☆10Feb 13, 2016Updated 10 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office doc…☆18Mar 20, 2025Updated 10 months ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detours…☆12Apr 2, 2013Updated 12 years ago
- No one writes dumb malware anymore. This is a repo for dumb malware.☆10Apr 18, 2017Updated 8 years ago
- ☆13Jun 27, 2024Updated last year
- A PowerShell script designed to detect misconfigured Azure Storage Accounts that could potentially be exploited for privilege escalation …☆13Apr 25, 2024Updated last year
- An embedded key/value database for Go.☆11Feb 18, 2022Updated 3 years ago
- ☆15Oct 31, 2022Updated 3 years ago
- vulnerable APIs inspired by https://github.com/mattvaldes/vulnerable-api☆13Dec 8, 2021Updated 4 years ago
- collects potentially vulnerable web pages and applications on the Internet or other awesome info that is picked up by Google's search bot…☆10Apr 24, 2021Updated 4 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆22Jul 31, 2025Updated 6 months ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago