tresacton / exploits
Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.
☆60Updated 9 years ago
Related projects ⓘ
Alternatives and complementary repositories for exploits
- Yet another AV evasion tool☆119Updated 2 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆43Updated 5 years ago
- ☆74Updated 2 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- Scripts that aren't PowerShell☆48Updated 4 years ago
- Exploit collection for NT privilege escalation☆65Updated 8 years ago
- LNHG - Mass Web Fingerprinter☆61Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- Exfiltrate files over dns requests using Python and/or Bash☆46Updated 9 years ago
- WeakNet PHP Execution Shell☆31Updated 9 years ago
- ☆125Updated 9 years ago
- Tools developed to test the Redirect to SMB issue☆83Updated 9 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- Ransack Post Exploitation Tool☆16Updated 8 years ago
- Exploit Win10Pcap Driver to enable some Privilege in our process token ( local Privilege escalation )☆59Updated 9 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆78Updated 8 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26Updated 8 years ago
- ☆138Updated 7 years ago
- Security scripts and programs I've made☆8Updated 10 years ago
- ☆111Updated 7 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 9 years ago