public exploits
☆35May 11, 2023Updated 2 years ago
Alternatives and similar repositories for oldays
Users that are interested in oldays are comparing it to the libraries listed below
Sorting:
- A Bayesian Method for the Induction of Probalistic Networks from Data☆19Jul 6, 2017Updated 8 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Python repository containing parsed standard C library function and argument information☆29Oct 3, 2018Updated 7 years ago
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- 优质安全 list☆12Nov 22, 2017Updated 8 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Nov 14, 2019Updated 6 years ago
- CVE-2018-3252-PoC☆74Dec 7, 2018Updated 7 years ago
- import pyd or execute PE all from memory using only pure python code and some shellcode tricks☆75Mar 16, 2017Updated 9 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- Docker image for SQLiScanner☆15Jul 26, 2017Updated 8 years ago
- masscan和namp结合实现全端口快速扫描,修改至onetwopunch项目bash脚本☆17Oct 17, 2016Updated 9 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Python Application to Reverse Freezing☆36Jul 21, 2016Updated 9 years ago
- Spam trap management☆24Jun 18, 2024Updated last year
- Certificate Expiration Monitor script☆27Oct 10, 2018Updated 7 years ago
- Testing vulnerabilities in devices and routers connected to the Internet.☆64Nov 19, 2015Updated 10 years ago
- Notes Template/Checklist for PEN-300 OSEP☆16Nov 20, 2021Updated 4 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- ☆68Nov 15, 2022Updated 3 years ago
- This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP …☆11Nov 3, 2020Updated 5 years ago
- Dexaran's Naming Service☆20Mar 22, 2023Updated 2 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Load a .so from network and execute it inside a seccomp sandbox☆19Jul 31, 2015Updated 10 years ago
- Penetration Test Vulnerabilities Manager is an extension for Burp Suite, written in Jython. It was developed by Barak Tawily in order to …☆31Jul 25, 2021Updated 4 years ago
- Exploit code for CVE-2020-11579, an arbitrary file disclosure through the MySQL client in PHPKB☆25Feb 6, 2024Updated 2 years ago
- Main repository to pull all Cisco related projects.☆16Sep 21, 2017Updated 8 years ago
- Scan networks for HTTP servers, do stuff when you find them.☆13Sep 11, 2017Updated 8 years ago
- A simple PoC for WordPress RCE (author priviledge), refer to CVE-2019-8942 and CVE-2019-8943.☆73Mar 18, 2019Updated 7 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 7 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated 2 years ago
- RCE on Rails 5.2.2 using a path traversal (CVE-2019-5418) and a deserialization of Ruby objects (CVE-2019-5420)☆133Jan 19, 2023Updated 3 years ago
- WebApp for BugBounty Hunters☆14Mar 24, 2017Updated 8 years ago
- a collection of payloads for common webapps☆72Apr 24, 2013Updated 12 years ago
- Use powershell to test Office-based persistence methods☆76Apr 17, 2021Updated 4 years ago
- Python script to compress VBA macro files☆24Feb 2, 2023Updated 3 years ago