xct / vulnbinsLinks
vulnerable windows binaries for exploitation practice
☆47Updated 3 years ago
Alternatives and similar repositories for vulnbins
Users that are interested in vulnbins are comparing it to the libraries listed below
Sorting:
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆50Updated 2 years ago
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆78Updated last year
- Signatus - A Vulnerable TCP server to practice Win32 exploitation☆51Updated 4 years ago
- ☆27Updated 3 years ago
- A tool for developing bad character-free shellcode to bypass DEP with WriteProcessMemory (32-bit only)☆72Updated 3 years ago
- Windows x64 Exploitation Training☆15Updated 6 months ago
- ☆12Updated 2 years ago
- Resources linked to my presentation at OffensiveX in Athens in June 2024 on the topic "Breach the Gat, Advanced Initial Access in 2024"☆146Updated last year
- All efforts for the AWE course and preparation for the Offensive Security Exploitation Expert (OSEE) exam.☆47Updated 5 years ago
- Rusty Impersonate☆102Updated last month
- Simple BOF to read the protection level of a process☆119Updated 2 years ago
- ☆71Updated 8 months ago
- Bypass AMSI By Dividing files into multiple smaller files☆46Updated 2 years ago
- Find DLLs with RWX section☆80Updated 2 years ago
- Get SYSTEM via SeDebugPrivilege☆23Updated 3 years ago
- Tools I use on red team engagements and more☆33Updated last year
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆107Updated 2 years ago
- rcat☆72Updated 3 years ago
- Tools/scripts I used/developed during the EXP-301 course.☆25Updated 3 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆102Updated 3 years ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Updated 4 years ago
- Local & remote Windows DLL Proxying☆169Updated last year
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆108Updated 3 years ago
- WTSImpersonator utilizes WTSQueryUserToken to steal user tokens by abusing the RPC Named Pipe "\\pipe\LSM_API_service"☆121Updated last year
- Mockingjay process self injection POC☆42Updated 2 years ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- Code dump from PEN-300/OSEP updated 2022☆42Updated 3 years ago
- Exploits a flaw in Remote Desktop Plus by monitoring and decrypting temporary .rdp files in %localappdata%/Temp, revealing credentials us…☆16Updated 5 months ago
- Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆19Updated 3 years ago
- This workshop is designed to provide you with a solid understanding of IronPython, its integration with the .NET framework, and how it ca…☆42Updated last year