Awesome tools to exploit Windows !
-
Updated
May 21, 2022
Awesome tools to exploit Windows !
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs
Open-source Exploiting Framework
Windows Defender disabler with tamper protection bypass. Assemby written using C#
Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.
Add a description, image, and links to the exploiting-windows topic page so that developers can more easily learn about it.
To associate your repository with the exploiting-windows topic, visit your repo's landing page and select "manage topics."