Vulnserver exploits
☆15May 1, 2020Updated 5 years ago
Alternatives and similar repositories for vulnserver-exploits
Users that are interested in vulnserver-exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- short, precise and uncommented solutions to keygenme or crackme challenges. INFO: Sadly crackmes.de got shut down. I do not have another …☆14Sep 14, 2016Updated 9 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- Tools that I've created/used during CTP-OSCE☆10Jun 17, 2019Updated 6 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- ☆16Jan 10, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Simple FTP fuzzer to demonstrate boofuzz usage.☆29May 21, 2021Updated 4 years ago
- miscellaneous stuff☆21Mar 31, 2015Updated 11 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆16Mar 3, 2026Updated last month
- Remap ntdll.dll using only NTAPI functions with a suspended process☆28Apr 13, 2025Updated last year
- Exploits written while preparing for the OSED exam☆25Apr 30, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- With xshellex you can paste any kind of c-shellcode strings in x64dbg, ollydbg & immunity debugger☆42Aug 11, 2023Updated 2 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆82Jul 7, 2018Updated 7 years ago
- All my blogs for ExpDev, HTB, BinaryExploit, Etc.☆13Jul 17, 2024Updated last year
- Repository to gather the .NET malware I will be developing☆17Mar 7, 2026Updated last month
- ☆23Jan 22, 2017Updated 9 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 6 months ago
- Example implementation of DNSAdmin DLL PrivEsc attack☆28Dec 11, 2019Updated 6 years ago
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆21Oct 13, 2018Updated 7 years ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆86Jan 26, 2026Updated 2 months ago
- The SecurityTube Linux Assembly Expert (SLAE) is an online course and certification which focuses on teaching the basics of 32-bit assemb…☆22Mar 31, 2019Updated 7 years ago
- A XPath injection demonstration application☆22Nov 14, 2020Updated 5 years ago
- Telegram bot utilizing OpenAI's GPT to generate presentations and abstracts in PPTX and DOCX formats.☆10Jan 10, 2024Updated 2 years ago
- 12-week Geekwise course on web application security and hardening.☆17Mar 19, 2020Updated 6 years ago
- a vulnerable GraphQL application☆20Dec 13, 2019Updated 6 years ago
- P/Invoke definitions from the most-of-the-time offline offline pinvoke.net. Website: https://ricardojoserf.gitbook.io/pinvoke☆23Mar 23, 2025Updated last year
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Personal blog about security, exploitation, CTFs, ...☆21Feb 20, 2019Updated 7 years ago
- Use normal web pentest tools to hack Websockets☆18Sep 23, 2019Updated 6 years ago
- Windows Privilege Escalation☆30Aug 14, 2020Updated 5 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 9 months ago
- BypassCredGuard CS BOF☆51Jan 23, 2025Updated last year
- steal Windows Telegram Desktop session☆15Sep 8, 2020Updated 5 years ago