shargon / Xploit
Open source exploit framework made in C#
☆54Updated 2 years ago
Related projects: ⓘ
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆65Updated 9 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- ☆16Updated this week
- A Generic Windows Memory Scraping Tool☆70Updated 7 years ago
- Yet another AV evasion tool☆118Updated 2 years ago
- ☆74Updated 2 years ago
- ☆54Updated this week
- ☆29Updated this week
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect…☆69Updated 10 years ago
- The educational Animus malware☆17Updated 4 years ago
- ☆84Updated this week
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆87Updated 9 years ago
- ☆42Updated 10 years ago
- ☆52Updated this week
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆38Updated 2 years ago
- ☆20Updated this week
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆71Updated 8 years ago
- Scripts that aren't PowerShell☆48Updated 4 years ago
- ☆23Updated this week
- WeakNet PHP Execution Shell☆31Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Updated 7 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆78Updated 8 years ago
- ☆61Updated this week
- Collection of tools for web recon and enumeration.☆56Updated 9 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆59Updated 8 years ago
- Practice and learning in the world of C RE and exploit analysis☆31Updated 6 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆43Updated 5 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 10 years ago