exploiting-windows
Here are 5 public repositories matching this topic...
Language:All
Awesome tools to exploit Windows !
- Updated
May 21, 2022
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
- Updated
Sep 7, 2025
Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs
- Updated
Jan 20, 2024
Open-source Exploiting Framework
- Updated
Mar 13, 2017 - Visual Basic
Powershell payloads for hacking attack. powershell are created for windows automation but hackers use it to hack devices illegally.
- Updated
Aug 6, 2022 - PowerShell
Improve this page
Add a description, image, and links to theexploiting-windows topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with theexploiting-windows topic, visit your repo's landing page and select "manage topics."