A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
-
Updated
Aug 4, 2023 - Python
A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
Windows Exploit development : Bypass Data Execution Prevention (DEP) using ROP chains manually hard code
This repository contains various ways to how to Exploit Windows systems, get their shell, or Escalate Privileges.
Sherlock and Watson exploit check against Windows Exploit Suggester NG (WesNG)
A detailed walkthrough for exploiting the VulnServer TRUN buffer overflow vulnerability, from fuzzing to Meterpreter shell. Includes code samples, explanations, and best practices for Windows exploit development.
This repository is dedicated to the vulnserver app exploitation. Each folder contain two files, the final exploit PoC.py and the fuzzing command file.
Add a description, image, and links to the windows-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the windows-exploitation topic, visit your repo's landing page and select "manage topics."