Wordpress Sploit Framework was developed for the purpose to provide a framework which creates proof of concept when discovering vulnerability in Wordpress core and Wordpress plugin.
☆33Sep 19, 2016Updated 9 years ago
Alternatives and similar repositories for wordpress-sploit-framework
Users that are interested in wordpress-sploit-framework are comparing it to the libraries listed below
Sorting:
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- ☆21Mar 24, 2015Updated 10 years ago
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆24Updated this week
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Proof of Concepts, Exploits☆28Apr 8, 2025Updated 11 months ago
- Slides from presentations done by ESET researchers☆20Dec 18, 2015Updated 10 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Dec 18, 2017Updated 8 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Small modification version of p0wnedShell☆40Apr 25, 2016Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- advanced Perl Backdoor☆13Jun 6, 2015Updated 10 years ago
- Application Security library☆11Nov 6, 2012Updated 13 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- ☆15Nov 29, 2017Updated 8 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆12Apr 30, 2014Updated 11 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- Exploit code for CVE-2016-9066☆45Mar 19, 2017Updated 9 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Feb 23, 2017Updated 9 years ago
- Flash XSS Scanner☆54Jun 26, 2016Updated 9 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- windows api hooking (user mode) sample☆21Jul 24, 2014Updated 11 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- The great RSA Attacking Toolkit compiled for Windows☆18Jan 20, 2016Updated 10 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆44Jun 5, 2023Updated 2 years ago
- Some kernel exploit i wrote☆77Jan 9, 2015Updated 11 years ago
- Java hex viewer component☆20Mar 4, 2011Updated 15 years ago
- ☆12Sep 2, 2017Updated 8 years ago