simonuvarov / expdev
Vulnerable software and exploits used for OSCP/OSCE preparation
☆24Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for expdev
- ☆21Updated 7 years ago
- ☆0Updated 5 years ago
- Alphanumeric Encoder☆25Updated 6 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 5 years ago
- ☆36Updated 6 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆17Updated 5 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 10 years ago
- Issues to consider when planning a red team exercise.☆14Updated 7 years ago
- Any code for preparing for OSCE☆12Updated 7 years ago
- A collection of OSCE preparation resources.☆23Updated 5 years ago
- miscellaneous stuff☆21Updated 9 years ago
- Scripts for OSCE☆18Updated 5 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated last year
- .NET Deserialization Passive Scanner☆45Updated 6 years ago
- WhiteBox CMS analysis☆68Updated last year
- AWS S3 Bucket/Object Finder☆25Updated 7 years ago
- Misc stuff☆10Updated 10 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆31Updated 6 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆27Updated 6 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Notes as I learn basic AWS penetration testing☆68Updated 5 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- A proof of concept for delivering webbugs via AWS lambda☆43Updated 6 years ago
- This repo will contain slides and information from the Attacking Active Directory Hacking Series talks presented at SecKC.☆32Updated 4 months ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Various tools for managing bug bounty recon and exploration.☆46Updated last year
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 7 years ago