sourceincite / tools
☆96Updated 3 years ago
Alternatives and similar repositories for tools:
Users that are interested in tools are comparing it to the libraries listed below
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- The Outlook HTML Leak Test Project☆132Updated 6 years ago
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- CVE-2018-8440 standalone exploit☆79Updated 6 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 7 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆59Updated 7 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- UAC 0Day all day!☆58Updated 7 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆35Updated 6 years ago
- Proof of Concept's provided by Source Incite☆37Updated 7 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- Mixing up CVE and MS like a pro☆24Updated 7 years ago
- Make Windows LNK file with python (pylnk)☆66Updated 8 years ago
- Reflective Polymorphism☆104Updated 6 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Updated 5 years ago
- ☆23Updated 9 years ago
- WhiteBox CMS analysis☆69Updated last year
- A repository of some of my Windows 10 Device Guard Bypasses☆134Updated 7 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Updated 7 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- PLASMA PULSAR☆69Updated 7 years ago
- ☆46Updated 5 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- ☆51Updated 7 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- A tool to exploit .NET DCOM for EoP and RCE. Is fixed in latest versions of the .NET.☆87Updated 10 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆106Updated 7 years ago