xct / vulnbinsLinks
vulnerable windows binaries for exploitation practice
☆49Updated 3 years ago
Alternatives and similar repositories for vulnbins
Users that are interested in vulnbins are comparing it to the libraries listed below
Sorting:
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆52Updated 2 years ago
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆79Updated 2 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆48Updated 5 years ago
- Signatus - A Vulnerable TCP server to practice Win32 exploitation☆52Updated 4 years ago
- ☆28Updated 3 years ago
- Rusty Impersonate☆102Updated 3 months ago
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆72Updated 3 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆109Updated 3 years ago
- Tools/scripts I used/developed during the EXP-301 course.☆26Updated 3 years ago
- ☆12Updated 2 years ago
- Simple BOF to read the protection level of a process☆119Updated 2 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆110Updated 2 years ago
- Windows x64 Exploitation Training☆15Updated 7 months ago
- ☆75Updated 10 months ago
- ☆102Updated 11 months ago
- Find DLLs with RWX section☆80Updated 2 years ago
- rcat☆75Updated 3 years ago
- Find .net assemblies locally☆129Updated 3 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆100Updated 3 years ago
- Get SYSTEM via SeDebugPrivilege☆24Updated 3 years ago
- D/Invoke standalone shellcode runners☆39Updated 2 years ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 3 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆122Updated last year
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆79Updated 2 years ago
- ☆105Updated last year
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆121Updated 2 months ago
- A variety of AV evasion techniques written in C# for practice.☆98Updated 4 years ago
- Code dump from PEN-300/OSEP updated 2022☆42Updated 3 years ago
- Local & remote Windows DLL Proxying☆169Updated last year