simonuvarov / expdevLinks
Vulnerable software and exploits used for OSCP/OSCE preparation
☆24Updated 8 years ago
Alternatives and similar repositories for expdev
Users that are interested in expdev are comparing it to the libraries listed below
Sorting:
- ☆22Updated 8 years ago
- ☆122Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- Issues to consider when planning a red team exercise.☆15Updated 8 years ago
- Alphanumeric Encoder☆25Updated 6 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- ☆36Updated 7 years ago
- Used for the osce exam preparation☆74Updated 9 years ago
- SUB/PUSH/POP based ASCII shellcode encoder☆23Updated 8 years ago
- ☆100Updated 3 years ago
- Verification tools for CVE-2016-1287☆33Updated 8 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Published vulnerabilities and exploits.☆57Updated 2 years ago
- Collection of things made during my preparation to take on OSEE☆101Updated 6 years ago
- Pentest Scripts for Apache Vulnerabilities☆31Updated 7 years ago
- ☆42Updated 9 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 11 years ago
- .NET Deserialization Passive Scanner☆46Updated 7 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 12 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated 9 months ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 7 years ago
- miscellaneous stuff☆21Updated 10 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 2 years ago
- VBA Reversed TCP Meterpreter Stager☆64Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- Implementing Kerberoast attack fully in python☆72Updated 7 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆31Updated 9 years ago