Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
-
Updated
Dec 16, 2025 - C++
Command-line post-exploitation toolkit for Microsoft SQL Server — enabling RCE, privilege escalation, persistence, and defense evasion via T-SQL.
Advanced Windows shellcode development framework with position-independent code generation, dynamic API resolution, and cross-architecture support for security research and penetration testing.
A lightweight tool for performing security checks on account protection, such as cloning users and adding users.
Encryption tool for Windows to load encrypted shell code. Tool for developing malicious software and in-memory execution.
An advanced Windows shell code loader and generator toolset featuring XOR encryption, debug protection, and GUI capabilities for penetration testing.
🔍 Analyze and exploit cross-function reentrancy vulnerabilities in smart contracts to enhance security and prevent critical risks.
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
O UFSC OFFSEC PwnBase é uma iniciativa acadêmica do Grupo de Segurança Ofensiva (OFFSEC) da Universidade Federal de Santa Catarina (UFSC) focada no estudo, pesquisa e desenvolvimento de técnicas de segurança ofensiva e hacking ético.
It records your screenshots and code, then lets you upload to ASHIRT
Educational demonstration of cross-function reentrancy vulnerability in a SC and its testnet exploitation
A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educational use only.
Zeus Malware Clone
MalWests, a repository dedicated to exploring malware development for Ethical Hacking, educational and research purposes only.
🔑 WiFi captive portal that capture credentials for ESP8266. Designed for Wireless Penetration tests.
An educational Bluetooth Low Energy (BLE) challenge for security researchers.
EmpireCTF – write-ups, capture the flag, cybersecurity
peTool is a tool designed to extract various information from Portable Executable
Inject DLLs into the explorer process using icons
Java Dynamic Reverse Engineering and Debugging Tool
Add a description, image, and links to the offensive-security topic page so that developers can more easily learn about it.
To associate your repository with the offensive-security topic, visit your repo's landing page and select "manage topics."