☆26Apr 24, 2025Updated 11 months ago
Alternatives and similar repositories for windows-hacking-stuff
Users that are interested in windows-hacking-stuff are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Educational Python implementation of RSA cryptosystem featuring key generation, encryption/decryption, and Base64 key exchange. Designed …☆10May 20, 2025Updated 10 months ago
- My mobile writeups repository☆27Nov 19, 2025Updated 4 months ago
- Two simple plugins for wireshark that can help in Network Forensics CTFs☆12Apr 21, 2025Updated 11 months ago
- 𝘔𝘢𝘯𝘺 𝘰𝘧 𝘵𝘩𝘦𝘴𝘦 𝘴𝘤𝘳𝘪𝘱𝘵𝘴 𝘢𝘳𝘦 𝘤𝘰𝘭𝘭𝘦𝘤𝘵𝘦𝘥 𝘧𝘳𝘰𝘮 𝘤𝘰𝘶𝘳𝘴𝘦𝘴, 𝘣𝘭𝘰𝘨𝘴, 𝘤𝘰𝘮𝘮𝘶𝘯𝘪𝘵𝘺 𝘳𝘦𝘴𝘰𝘶𝘳𝘤�…☆26Nov 30, 2025Updated 3 months ago
- Recursos y materiales vistos, usados, en el taller de Introducción al Hacking Ético, que ha sido impartido por Jesús Eduardo Lugo Vela y …☆14Mar 14, 2024Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆160Updated this week
- ☆29May 26, 2025Updated 9 months ago
- Log-Zapper is a linux and windows secure Log cleaner.☆22Jun 15, 2024Updated last year
- Exhaustive search and flexible filtering of Active Directory ACEs.☆77Nov 10, 2025Updated 4 months ago
- A tool for mapping cypher databases☆16Jan 20, 2026Updated 2 months ago
- ☆12Mar 8, 2026Updated 2 weeks ago
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- CVE-2025-38001: Linux HFSC Eltree Use-After-Free - Debian 12 PoC☆93Jul 11, 2025Updated 8 months ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Configuration files for desktop environment☆24Feb 20, 2024Updated 2 years ago
- ☆21Jul 25, 2017Updated 8 years ago
- ☆12Apr 11, 2025Updated 11 months ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 3 months ago
- ☆22Apr 11, 2025Updated 11 months ago
- A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industria…☆33Jan 23, 2022Updated 4 years ago
- a simple HTML/JQuery file upload system that is powered by node.js and MongoDB's GridFS☆13Aug 9, 2013Updated 12 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- Accelerating DevSecOps on AWS, published by Packt☆14Jan 30, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A look at how different email closings correlate with response rate.☆12Jan 31, 2017Updated 9 years ago
- HackTheBox: Certified Bug Bounty Hunter's Writeup by Hung Thinh Tran☆14May 27, 2023Updated 2 years ago
- All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs☆56Jan 29, 2023Updated 3 years ago
- ☆11Dec 15, 2022Updated 3 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.☆17Feb 3, 2025Updated last year
- A Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project's Tiny File Manager <…☆13Feb 3, 2024Updated 2 years ago
- CTF Writeup for Car Hacking Village, DEF CON 30 (2022)☆12Aug 16, 2022Updated 3 years ago
- High-precision, real-time people locator via a link☆18Nov 28, 2023Updated 2 years ago
- A collection of challenges I made for CTF competitions☆17Jan 28, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Zimbra CVE-2022-27925 PoC☆43Aug 27, 2022Updated 3 years ago
- ☆19May 24, 2022Updated 3 years ago
- A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identi…☆35Aug 15, 2024Updated last year
- CVE-2024-32002 RCE PoC☆108May 18, 2024Updated last year
- XSSInspector can defeat any WAF in the world with its AI and 96 filter set. This open-source solution simplifies XSS vulnerability identi…☆12Sep 8, 2025Updated 6 months ago
- GreyHack Vim implementation☆12Jan 1, 2024Updated 2 years ago
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆16Jun 2, 2025Updated 9 months ago