xcalibure2's Stars
vavkamil/awesome-bugbounty-tools
A curated list of various bug bounty tools
devanshbatham/ParamSpider
Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing
p3nt4/PowerShdll
Run PowerShell with rundll32. Bypass software restrictions.
codingo/Interlace
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
7etsuo/windows-api-function-cheatsheets
A reference of Windows API function calls, including functions for file operations, process management, memory management, thread management, dynamic-link library (DLL) management, synchronization, interprocess communication, Unicode string manipulation, error handling, Winsock networking operations, and registry operations.
Dheerajmadhukar/karma_v2
β‘·β πππππ ππΈβ β’Ύ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)
vladko312/SSTImap
Automatic SSTI detection tool with interactive interface
Syslifters/OffSec-Reporting
Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool
nahamsec/nahamsec.training
The labs for my Udemy course (https://www.udemy.com/course/intro-to-bug-bounty-by-nahamsec)
ricardojoserf/TrickDump
Dump lsass using only NTAPIS running 3 programs to create 3 JSON and 1 ZIP file... and generate the Minidump later!
KooroshRZ/Windows-DLL-Injector
Some DLL Injection techniques in C++ implemented for both x86 and x64 windows OS processes
synacktiv/eos
Enemies Of Symfony - Debug mode Symfony looter
brinhosa/apidetector
APIDetector: Efficiently scan for exposed Swagger endpoints across web domains and subdomains. Supports HTTP/HTTPS, multi-threading, and flexible input/output options. Ideal for API security testing.
CICADA8-Research/IHxExec
Process injection alternative
danialhalo/SqliSniper
Advanced Time-based Blind SQL Injection fuzzer for HTTP Headers
jbarone/xxelab
A simple web app with a XXE vulnerability.
joaoviictorti/shadow-rs
Windows Kernel Rootkit in Rust
lauritzh/domscan
Simple tool to scan a website for (DOM-based) XSS vulnerabilities and Open Redirects.
Pennyw0rth/NetExec-Lab
Lab used for workshop and CTF
CICADA8-Research/COMThanasia
A set of programs for analyzing common vulnerabilities in COM
CICADA8-Research/MyMSIAnalyzer
Analyse MSI files for vulnerabilities
Elymaro/rootscan
Speed up your pentest enumeration
filipkarc/sqli-postgres-rce-privesc-hacking-playground
Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration testing training.
milkdevil/injectAllTheThings
two06/CerealKiller
.NET deserialization hunter
Offensive-Panda/.NET_PROFILER_DLL_LOADING
.NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit is loading a malicious DLL using Task Scheduler (MMC) to bypass UAC and getting admin privileges.
tuxotron/xvwa_lamp_container
XVWA on LAMP base docker image
Crowdfense/CVE-2024-21338
Windows AppLocker Driver (appid.sys) LPE
a7t0fwa7/BSQLi-2.0
reverse engineered and improved BSQLi script from Coffinxp
Offensive-Panda/NT-AUTHORITY-SYSTEM-CONTEXT-RTCORE
This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCore32.sys) allows any authenticated user to read and write to arbitrary memory, I/O ports, and MSRs. Instead of hardcoded base address of Ntoskrnl.exe, I calculated it dynamically and recalulated the fields offsets