sectool / Python-Shellcode-Buffer-Overflow
Shellcode / Buffer Overflow 💣
☆18Updated 4 years ago
Related projects: ⓘ
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆21Updated 5 years ago
- SWF Vulnerability & Information Scanner☆19Updated 5 years ago
- Port scanning and domain utility.☆29Updated 7 years ago
- Collection of cracked malware☆14Updated 5 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- ☆10Updated this week
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 4 years ago
- ☆14Updated this week
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- ☆10Updated this week
- FWRF is a open source tool for firmware web-side analysis.☆12Updated 9 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- ☆11Updated this week
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- Automated Payload Test Controller☆9Updated 7 years ago
- Python tool for Dorking☆11Updated last year
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆35Updated 6 years ago
- ☆17Updated 7 months ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 6 years ago
- ☆18Updated this week
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Updated 6 years ago