Vulnserver exploits
☆14May 1, 2020Updated 6 years ago
Alternatives and similar repositories for vulnserver-exploits
Users that are interested in vulnserver-exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of OSCE preparation resources.☆24Oct 30, 2019Updated 6 years ago
- short, precise and uncommented solutions to keygenme or crackme challenges. INFO: Sadly crackmes.de got shut down. I do not have another …☆13Sep 14, 2016Updated 9 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Jul 7, 2017Updated 8 years ago
- Tools that I've created/used during CTP-OSCE☆10Jun 17, 2019Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- DLL Injection to Exe with Assembly using OllyDbg☆25Oct 28, 2017Updated 8 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- ☆16Jan 10, 2017Updated 9 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Simple FTP fuzzer to demonstrate boofuzz usage.☆28May 21, 2021Updated 4 years ago
- miscellaneous stuff☆21Mar 31, 2015Updated 11 years ago
- Parser of the industrial protocol S7 (S7comm) using Libpcap☆15May 1, 2020Updated 6 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Windows Privilege Escalation☆51Jun 8, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆16Mar 3, 2026Updated 2 months ago
- Remap ntdll.dll using only NTAPI functions with a suspended process☆28Apr 13, 2025Updated last year
- With xshellex you can paste any kind of c-shellcode strings in x64dbg, ollydbg & immunity debugger☆41Aug 11, 2023Updated 2 years ago
- All my blogs for ExpDev, HTB, BinaryExploit, Etc.☆13Jul 17, 2024Updated last year
- ☆23Jan 22, 2017Updated 9 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 7 months ago
- POWER-targeted JIT fork of Mozilla.☆10Apr 29, 2022Updated 4 years ago
- Example implementation of DNSAdmin DLL PrivEsc attack☆28Dec 11, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆21Oct 13, 2018Updated 7 years ago
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆86Jan 26, 2026Updated 3 months ago
- Copy-on-write fork()-like memory dump using Process Snapshotting APIs☆13Jul 23, 2017Updated 8 years ago
- A XPath injection demonstration application☆22Nov 14, 2020Updated 5 years ago
- POC for CVE-2024-23897 Jenkins File-Read☆39Nov 20, 2025Updated 5 months ago
- Work in progress to create an RFC that documents the OpenVPN protocol☆15Updated this week
- 12-week Geekwise course on web application security and hardening.☆17Mar 19, 2020Updated 6 years ago
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Mar 26, 2014Updated 12 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Personal blog about security, exploitation, CTFs, ...☆21Feb 20, 2019Updated 7 years ago
- C-shellcode to hex converter, handy tool for paste & execute shellcodes in IDA PRO, gdb, windbg, radare2, ollydbg, x64dbg, immunity debug…☆112Aug 11, 2023Updated 2 years ago
- Use normal web pentest tools to hack Websockets☆18Sep 23, 2019Updated 6 years ago
- Windows Privilege Escalation☆30Aug 14, 2020Updated 5 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- Journey to Try Harder !!!☆31Aug 30, 2019Updated 6 years ago
- Post-Silicon Validation Tool based on REVERSI☆10Dec 10, 2025Updated 4 months ago