A set of commonly-used static binaries
☆207Oct 8, 2024Updated last year
Alternatives and similar repositories for static-binaries
Users that are interested in static-binaries are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- static binaries linux i386☆117Jul 2, 2015Updated 10 years ago
- Various *nix tools built as statically-linked binaries☆3,658Aug 21, 2023Updated 2 years ago
- A .Net Core MVC webshell☆11Sep 8, 2018Updated 7 years ago
- C2 redirector as a web API☆10May 22, 2021Updated 4 years ago
- Material from CTF machines I have attempted☆39Jul 5, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆47Jul 9, 2022Updated 3 years ago
- ☆20Oct 27, 2020Updated 5 years ago
- Check the Domain for Local Admin Access☆20Feb 20, 2025Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆103May 10, 2022Updated 3 years ago
- Squid Pivoting Open Port Scanner☆100Dec 5, 2024Updated last year
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- You can gather useful information accounts by username across all types networks ( which also include social media)☆28Oct 19, 2023Updated 2 years ago
- ☆10May 17, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- If you only have hash, you can still operate exchange☆77Oct 21, 2021Updated 4 years ago
- Vulnerable webapp testbed☆24May 11, 2016Updated 9 years ago
- Script for pentest☆39Oct 14, 2020Updated 5 years ago
- guest→system(UAC手动提权)☆74Mar 18, 2020Updated 6 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Mara is a userland pty/tty sniffer☆53Dec 22, 2023Updated 2 years ago
- ☆10Oct 31, 2022Updated 3 years ago
- ☆15Jul 13, 2023Updated 2 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆969Dec 29, 2017Updated 8 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ropr with some tweaks for better linux kernel support☆38Apr 25, 2025Updated 11 months ago
- Improving side channel analysis techniques for CTF problems.☆12Oct 25, 2020Updated 5 years ago
- ☆13Apr 27, 2020Updated 5 years ago
- A tool to tunnel TCP traffic over WinRM☆18Jul 15, 2021Updated 4 years ago
- ☆33May 16, 2018Updated 7 years ago
- LDAP Enumeration Tool☆13Mar 28, 2024Updated 2 years ago
- Another Windows Local Privilege Escalation from Service Account to System☆1,166Jan 9, 2021Updated 5 years ago
- A general way to Recover Safe linking protected value/pointer☆15Oct 23, 2022Updated 3 years ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- some ida script☆34Aug 18, 2021Updated 4 years ago
- ☆29May 25, 2021Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- Script to test NetSec capabilities.☆21May 1, 2023Updated 2 years ago
- JAWS - Just Another Windows (Enum) Script☆1,937Apr 19, 2021Updated 4 years ago
- This is collection of latest CVE POCs.☆30Mar 1, 2022Updated 4 years ago
- POC code to crash Windows Event Logger Service☆27Oct 16, 2020Updated 5 years ago