C implementation of the file-less UAC exploit
☆74Sep 1, 2016Updated 9 years ago
Alternatives and similar repositories for zero2hero
Users that are interested in zero2hero are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts created to help with post exploitation of a Windows host☆99Feb 1, 2021Updated 5 years ago
- Juicy Potato for x86 Windows☆133Oct 12, 2019Updated 6 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010 AKA EternalBlue☆12Dec 31, 2018Updated 7 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆32Dec 23, 2019Updated 6 years ago
- Changes for Visual Studio 2013☆119Jun 22, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Access windows machine remotely on HTTP☆12Oct 28, 2020Updated 5 years ago
- ☆16Oct 26, 2021Updated 4 years ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- Updating MS08-067 Python exploit script☆105Aug 18, 2018Updated 7 years ago
- Debian OpenSSL Predictable PRNG (CVE-2008-0166)☆411Jan 22, 2023Updated 3 years ago
- Some random exploits that may or may not be useful. Not responsible for misuse.☆21Dec 12, 2018Updated 7 years ago
- MS17-010☆273Aug 25, 2022Updated 3 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,166Jan 9, 2021Updated 5 years ago
- i made this simple lite version of dsplit.exe to detect antivirus signature matching☆15Nov 6, 2013Updated 12 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,756Dec 18, 2021Updated 4 years ago
- Go package to check if an IP address is a bogon (internal) IP address☆10Oct 20, 2025Updated 5 months ago
- ☆21Jan 28, 2020Updated 6 years ago
- Charter of the Open Network Infrastructure Association☆13Sep 9, 2017Updated 8 years ago
- ☆27Jul 2, 2020Updated 5 years ago
- Tool to acquire netNTLM hashes on a local machine wihtout network traffic☆13May 18, 2018Updated 7 years ago
- CVE-2007-2447 - Samba usermap script☆62Aug 16, 2020Updated 5 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆613Feb 6, 2015Updated 11 years ago
- Squid Pivoting Open Port Scanner☆101Dec 5, 2024Updated last year
- Just some exploits :P☆47Jan 18, 2021Updated 5 years ago
- Some vulnerability research slides that I made☆12Jan 5, 2022Updated 4 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆19Apr 12, 2020Updated 6 years ago
- Old version of mimikatz for OSCP labs☆18Aug 1, 2020Updated 5 years ago
- ☆1,492Dec 31, 2022Updated 3 years ago
- ☆11Feb 8, 2022Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Go package for resolving IP addresses back to published cloud provider public ranges☆27May 8, 2018Updated 7 years ago
- A comprehensive guide/material for anyone looking to get into infosec or take the OSCP exam☆44Feb 4, 2019Updated 7 years ago
- Simple forward and reverse shells that can be compiled and used on pen tests to avoid AV and used to get better access.☆29Feb 6, 2013Updated 13 years ago
- random powershell goodness☆460Nov 21, 2024Updated last year
- A reverse proxying program to allow services e.g. Nextcloud, Bitwarden etc to be accessed over Tor (SOCKS5) even when the client app do n…☆24Oct 21, 2024Updated last year
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Oct 1, 2016Updated 9 years ago
- find historical account IDs for specified twitter @ name using wayback machine captures☆25Oct 15, 2021Updated 4 years ago