Miscellaneous exploit scripts
☆17May 24, 2022Updated 3 years ago
Alternatives and similar repositories for MiscSploits
Users that are interested in MiscSploits are comparing it to the libraries listed below
Sorting:
- Scripts aiding penetration testing of Splunk Enterprise systems☆10Jan 29, 2019Updated 7 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Simple scripts aiding penetration testing process☆15Mar 10, 2020Updated 5 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Apr 15, 2023Updated 2 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Dec 8, 2025Updated 2 months ago
- ☆17Jul 26, 2018Updated 7 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated 2 weeks ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆20Mar 21, 2018Updated 7 years ago
- Security Product Taskbar Icons (to identify from screenshots)☆58Mar 27, 2020Updated 5 years ago
- an RCE (remote command execution) approach of CVE-2018-7750☆21Nov 6, 2018Updated 7 years ago
- ☆19Mar 21, 2020Updated 5 years ago
- Ospy is a penetration testing tool for macOS, include keylogger, live screen catcher, reveres shell and more. Developed in c☆24May 18, 2019Updated 6 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆28Jan 17, 2021Updated 5 years ago
- Learn how to connect raspberry pi to laptop wirelessly. Share your raspberry pi screen on laptop and control it with laptop mouse and key…☆11Jul 4, 2021Updated 4 years ago
- ☆23May 23, 2024Updated last year
- ☆63Sep 10, 2019Updated 6 years ago
- ☆25Dec 13, 2016Updated 9 years ago
- This is a small extension to make graphql readable☆30Dec 14, 2018Updated 7 years ago
- This repository contains the POC of an exploit for node-jose < 0.11.0☆25Feb 24, 2023Updated 3 years ago
- Unpacker for ILProtector☆30Feb 24, 2023Updated 3 years ago
- Playing around with token manipulation in C#.☆29Nov 6, 2019Updated 6 years ago
- Protect your servers with a secret header☆29Jun 12, 2020Updated 5 years ago
- A web application for generating custom XSS payloads☆78Dec 29, 2019Updated 6 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- Just a silly recon tool that uses data from SSL Certificates to find potential host names☆29Feb 17, 2026Updated 2 weeks ago
- LogRM is a post exploitation powershell script which it uses windows event logs to gather information about internal network☆74Jul 9, 2019Updated 6 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆31Mar 11, 2021Updated 4 years ago
- double-free bug in WhatsApp exploit poc☆268Mar 19, 2021Updated 4 years ago
- The official WHMCS 7.5.3 Release, released by @lmsfao.☆10Apr 8, 2019Updated 6 years ago
- ModbusTCP Fuzzing and DoS Tool.☆11Aug 8, 2020Updated 5 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated last month
- Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)☆41Jul 5, 2020Updated 5 years ago
- Babel-Shellfish deobfuscates and scans Powershell scripts on real-time right before each line execution.☆43Nov 10, 2018Updated 7 years ago
- ☆34Jan 1, 2019Updated 7 years ago