☆26Apr 24, 2025Updated 10 months ago
Alternatives and similar repositories for windows-hacking-stuff
Users that are interested in windows-hacking-stuff are comparing it to the libraries listed below
Sorting:
- Educational Python implementation of RSA cryptosystem featuring key generation, encryption/decryption, and Base64 key exchange. Designed …☆10May 20, 2025Updated 9 months ago
- Two simple plugins for wireshark that can help in Network Forensics CTFs☆12Apr 21, 2025Updated 10 months ago
- Recursos y materiales vistos, usados, en el taller de Introducción al Hacking Ético, que ha sido impartido por Jesús Eduardo Lugo Vela y …☆14Mar 14, 2024Updated last year
- Log-Zapper is a linux and windows secure Log cleaner.☆22Jun 15, 2024Updated last year
- 🦀 RUSTVERSARY: A comprehensive repository of tools and scripts for malware development practices.☆29May 10, 2024Updated last year
- Configuration files for desktop environment☆24Feb 20, 2024Updated 2 years ago
- ☆29May 26, 2025Updated 9 months ago
- A First Look at Conventional Commits Classification☆12Nov 18, 2024Updated last year
- ☆21Jul 25, 2017Updated 8 years ago
- ☆13Jan 17, 2025Updated last year
- This is to reorganize my notes☆10Apr 26, 2021Updated 4 years ago
- ☆14Jan 2, 2026Updated 2 months ago
- A look at how different email closings correlate with response rate.☆12Jan 31, 2017Updated 9 years ago
- a simple HTML/JQuery file upload system that is powered by node.js and MongoDB's GridFS☆13Aug 9, 2013Updated 12 years ago
- An archive of the challenges found in the Blackhat MEA 2024 Qualifiers CTF☆11Sep 2, 2024Updated last year
- ☆12Feb 28, 2022Updated 4 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Apr 2, 2021Updated 4 years ago
- GreyHack Vim implementation☆12Jan 1, 2024Updated 2 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆10Feb 6, 2024Updated 2 years ago
- A collection of challenges I made for CTF competitions☆17Jan 28, 2026Updated last month
- Adapted PE Loader to load a rc4 encrypted mimikatz shellcode into memory with specified arguments before exiting.☆16Jun 2, 2025Updated 9 months ago
- All Linux privilege Escalation methods are listed under one MarkDown🦁 i.e Kernel Exploits to Cronjobs☆55Jan 29, 2023Updated 3 years ago
- ☆13Jul 11, 2024Updated last year
- XSSInspector can defeat any WAF in the world with its AI and 96 filter set. This open-source solution simplifies XSS vulnerability identi…☆12Sep 8, 2025Updated 5 months ago
- This repository contains official source code and writeups for challenges from World Wide CTF 2024 - https://ctftime.org/event/2572☆12Dec 19, 2024Updated last year
- Nibbleblog 4.0.3 - Arbitrary File Upload (CVE-2015-6967)☆15Feb 25, 2021Updated 5 years ago
- CTF Writeup for Car Hacking Village, DEF CON 30 (2022)☆12Aug 16, 2022Updated 3 years ago
- A Path traversal vulnerability in the file upload functionality in tinyfilemanager.php in Tiny File Manager Project's Tiny File Manager <…☆13Feb 3, 2024Updated 2 years ago
- Python tool for enumerating directories and files on web servers that contain a publicly readable .ds_store file.☆70Oct 29, 2021Updated 4 years ago
- HackTheBox: Certified Bug Bounty Hunter's Writeup by Hung Thinh Tran☆13May 27, 2023Updated 2 years ago
- This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT i…☆12Sep 25, 2024Updated last year
- A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell option…☆14Jun 27, 2023Updated 2 years ago
- Random perl scripts from 2007 that may be usefull☆15Nov 21, 2015Updated 10 years ago
- CVE-2023-46818 IPSConfig Python exploit☆17Oct 8, 2024Updated last year
- Python exploit for vsftpd 2.3.4 - Backdoor Command Execution☆15Jan 8, 2023Updated 3 years ago
- WinXPSP2.Cermalus on stereoids, supporting all 32 bits Windows version. Windows Kernel Virus stuff for noobs☆18Aug 11, 2023Updated 2 years ago
- Fake Wifi AP using ESP32 and ESPAsyncWebServer for hosting static web payloads.☆17Apr 22, 2023Updated 2 years ago
- Powering Hardware, Radio, Web, and IoT Security Assessments Trilokya OS is a powerful, security-focused operating system designed for pen…☆22Feb 15, 2026Updated 2 weeks ago
- Multi-target unauthenticated RCE scanner for CVE-2025-34085 affecting WordPress Simple File List plugin. Uploads, renames, and triggers P…☆33Jul 13, 2025Updated 7 months ago