C implementation of the file-less UAC exploit
☆74Sep 1, 2016Updated 9 years ago
Alternatives and similar repositories for zero2hero
Users that are interested in zero2hero are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts created to help with post exploitation of a Windows host☆99Feb 1, 2021Updated 5 years ago
- Juicy Potato for x86 Windows☆130Oct 12, 2019Updated 6 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010 AKA EternalBlue☆12Dec 31, 2018Updated 7 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆32Dec 23, 2019Updated 6 years ago
- Changes for Visual Studio 2013☆119Jun 22, 2015Updated 10 years ago
- Access windows machine remotely on HTTP☆12Oct 28, 2020Updated 5 years ago
- ☆16Oct 26, 2021Updated 4 years ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- Updating MS08-067 Python exploit script☆105Aug 18, 2018Updated 7 years ago
- MS17-010☆273Aug 25, 2022Updated 3 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,161Jan 9, 2021Updated 5 years ago
- i made this simple lite version of dsplit.exe to detect antivirus signature matching☆15Nov 6, 2013Updated 12 years ago
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,744Dec 18, 2021Updated 4 years ago
- ☆21Jan 28, 2020Updated 6 years ago
- Go package to check if an IP address is a bogon (internal) IP address☆10Oct 20, 2025Updated 5 months ago
- Charter of the Open Network Infrastructure Association☆13Sep 9, 2017Updated 8 years ago
- ☆27Jul 2, 2020Updated 5 years ago
- LuaJIT FFI Interop to Raspberry Pi☆35Jan 8, 2016Updated 10 years ago
- CVE-2007-2447 - Samba usermap script☆62Aug 16, 2020Updated 5 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- ☆22Jun 23, 2016Updated 9 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆608Feb 6, 2015Updated 11 years ago
- Squid Pivoting Open Port Scanner☆100Dec 5, 2024Updated last year
- Just some exploits :P☆47Jan 18, 2021Updated 5 years ago
- Some vulnerability research slides that I made☆12Jan 5, 2022Updated 4 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆19Apr 12, 2020Updated 5 years ago
- Old version of mimikatz for OSCP labs☆18Aug 1, 2020Updated 5 years ago
- ☆1,490Dec 31, 2022Updated 3 years ago
- ☆11Feb 8, 2022Updated 4 years ago
- Go package for resolving IP addresses back to published cloud provider public ranges☆27May 8, 2018Updated 7 years ago
- ntp service via WebSocket☆16Jun 14, 2024Updated last year
- A comprehensive guide/material for anyone looking to get into infosec or take the OSCP exam☆44Feb 4, 2019Updated 7 years ago
- Simple forward and reverse shells that can be compiled and used on pen tests to avoid AV and used to get better access.☆29Feb 6, 2013Updated 13 years ago
- random powershell goodness☆460Nov 21, 2024Updated last year
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Oct 1, 2016Updated 9 years ago
- find historical account IDs for specified twitter @ name using wayback machine captures☆25Oct 15, 2021Updated 4 years ago