☆32Oct 21, 2023Updated 2 years ago
Alternatives and similar repositories for Buffer-Overflow
Users that are interested in Buffer-Overflow are comparing it to the libraries listed below
Sorting:
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Sep 17, 2020Updated 5 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Jul 9, 2020Updated 5 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆32Mar 2, 2019Updated 7 years ago
- Installer preseed configurations for Kali Linux☆15Oct 20, 2021Updated 4 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- ☆37Jul 25, 2019Updated 6 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Python template to assist with buffer overflows☆73Nov 12, 2019Updated 6 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- buffer-overflow☆15Feb 2, 2022Updated 4 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆25Dec 13, 2020Updated 5 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆63Jul 3, 2021Updated 4 years ago
- Defcon 28 - Red Team Village - Applied Purple Teaming - Why Can't We Be Friends☆26Aug 9, 2020Updated 5 years ago
- wew oscp☆281Jun 28, 2022Updated 3 years ago
- ARCHIVED: Use 'peh' instead☆16May 4, 2021Updated 4 years ago
- Suggests programs to run against services found during the enumeration phase of a Pentest☆116Oct 25, 2025Updated 4 months ago
- ☆18Nov 18, 2020Updated 5 years ago
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆18Nov 27, 2017Updated 8 years ago
- ☆15May 17, 2018Updated 7 years ago
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆13Mar 6, 2023Updated 3 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Reconnaissance and Enumeration automation script☆53Mar 16, 2021Updated 5 years ago
- This reconissance tool is specific written for OSCP engagements.☆55May 22, 2023Updated 2 years ago
- Simple script to generate commands to achieve reverse shells.☆121Dec 14, 2020Updated 5 years ago
- Buffer Overflows☆28Jan 30, 2021Updated 5 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- Ansible playbook for Kali☆31Aug 11, 2024Updated last year
- ☆75Mar 24, 2021Updated 4 years ago
- A simple Markdown checklist for Penetration Testing with Kali Linux 2020 course exercises as part of OSCP.☆63Jun 19, 2020Updated 5 years ago
- Good For OSCP Training☆443Jan 26, 2019Updated 7 years ago
- Exploits for different vulnerabilities☆13Nov 29, 2021Updated 4 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- OSCP cheet sheet☆201Oct 21, 2020Updated 5 years ago
- ☆55Oct 9, 2023Updated 2 years ago
- My walkthrough of the LPEWorkshop exercises☆36Aug 17, 2020Updated 5 years ago
- Shell Please 1.0 : Reverse shell code generator.☆36Jul 3, 2022Updated 3 years ago
- ☆12Feb 8, 2021Updated 5 years ago