winsecurity / custom_vulnerable_executables
☆18Updated 4 years ago
Alternatives and similar repositories for custom_vulnerable_executables:
Users that are interested in custom_vulnerable_executables are comparing it to the libraries listed below
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Updated 5 years ago
- ☆14Updated 4 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 5 years ago
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆28Updated 6 years ago
- Empower your enumeration during OSCP☆35Updated 6 years ago
- A collection of tools, notes, & resources I've created during my OSCP certification journey.☆9Updated 3 years ago
- ☆23Updated 5 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- Import Nmap scans to Cherrytree☆36Updated 2 years ago
- ☆25Updated 5 months ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- A list of "secrets" from JWT sample code and readme files.☆53Updated 4 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆32Updated 7 years ago
- Simple python script for AD enumeration☆31Updated 3 years ago
- These are my notes for OSCP preparation. Hope you'll find them useful.☆14Updated 5 years ago
- ☆28Updated 4 years ago
- Journey to Try Harder !!!☆32Updated 5 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆14Updated 5 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆18Updated 5 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 4 years ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Updated 5 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆23Updated 4 years ago
- Files for my Python3 Create Your Own Tool Series☆23Updated 2 years ago
- Offensive Security Wireless Professional☆17Updated 4 years ago
- My walkthrough of the LPEWorkshop exercises☆37Updated 4 years ago