xct / vulnbins
vulnerable windows binaries for exploitation practice
☆40Updated 2 years ago
Alternatives and similar repositories for vulnbins:
Users that are interested in vulnbins are comparing it to the libraries listed below
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆45Updated last year
- Signatus - Vulnerable TCP C++ server to practice Win 32 exploitation.☆48Updated 3 years ago
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆45Updated 4 years ago
- Python based WinDbg script to automate the search for code caves in binaries and libraries.☆49Updated 4 months ago
- QuoteDB (Vulnerable TCP Server)☆70Updated last year
- ☆12Updated 2 years ago
- Windbg Readable & Dark Green Theme - Own Use☆45Updated 6 years ago
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆57Updated 2 years ago
- Notes template for Offensive Security's EXP-301 course and OSED exam☆18Updated 3 years ago
- Tools/scripts I used/developed during the EXP-301 course.☆18Updated 2 years ago
- Windows x64 Exploitation Training☆15Updated 3 weeks ago
- Find DLLs with RWX section☆80Updated last year
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆59Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆101Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated last year
- Simple BOF to read the protection level of a process☆114Updated last year
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆93Updated 2 years ago
- ☆90Updated 2 months ago
- ☆11Updated last year
- ☆29Updated 8 months ago
- Rusty Impersonate☆95Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆148Updated last year
- ☆32Updated 3 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆139Updated 8 months ago
- Get SYSTEM via SeDebugPrivilege☆20Updated 2 years ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆15Updated 2 years ago
- ☆69Updated last month
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated last year
- ☆61Updated 11 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 5 months ago