Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement
-
Updated
Apr 10, 2022 - PowerShell
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement
Random stuff
Powershell UAC Bypass script leveraging WinSAT.exe
Offensive security cheat sheet library
🆘 Precompiled binaries for Ghostpack and other for Windows and Linux.
Trying my best with powershell using the docs and other resources, any critisism is necessary
Simple exe's to exploit Windows privileges
Search for vulnerabilites in software or hardware and grab actionable CVE information.
PoC for CVE-2017-5487 - WordPress User Enumeration via REST
Created by The cybersecurity community