☆16May 9, 2016Updated 9 years ago
Alternatives and similar repositories for Exploit-POCs
Users that are interested in Exploit-POCs are comparing it to the libraries listed below
Sorting:
- AYY LMAO☆12Aug 27, 2015Updated 10 years ago
- run winbox (Mikrotik RouterOS configuration GUI) via Wine inside Docker☆14Jun 19, 2014Updated 11 years ago
- ☆15Jun 17, 2016Updated 9 years ago
- ☆13Aug 15, 2017Updated 8 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- RFID controller for the Sonos music player☆15Jul 16, 2019Updated 6 years ago
- Quickly generate snort rules for IOCs☆18Oct 21, 2015Updated 10 years ago
- ☆33May 23, 2014Updated 11 years ago
- Suite for Information gathering☆12Jul 2, 2018Updated 7 years ago
- an advanced level shifting neighbor☆11Dec 6, 2021Updated 4 years ago
- SnappingTurtle: A cross platform web exploitation tool.☆18Apr 11, 2016Updated 9 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆41Apr 28, 2018Updated 7 years ago
- Python tools for reverse engineering Microsoft 3D Movie Maker☆12Feb 28, 2021Updated 5 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Export Maltego Graphs to JSON format☆21Nov 9, 2017Updated 8 years ago
- Main dwm. Status: [Active]☆19Jan 22, 2017Updated 9 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/servuino☆11Oct 8, 2018Updated 7 years ago
- Python 3 bridge to IDA's Python environment☆17Aug 27, 2020Updated 5 years ago
- python 3D mesh loading and displaying☆10Apr 3, 2024Updated last year
- A small Php package to fetch archive url snapshots from archive.org. Using it you can fetch complete list of snapshot urls of any year or…☆19Jun 20, 2021Updated 4 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- This project uses the .NET framework to bypass Antivirus solutions.☆29Mar 24, 2013Updated 12 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- Get the absolute file path to a bin entry of an installed dependency☆17May 4, 2022Updated 3 years ago
- This is an elevator, a reminder of the installation / And dump files / Here is a list of the current mount options in btrfs / Desktop The…☆18May 25, 2021Updated 4 years ago
- RESTful API for Unipacker (https://github.com/unipacker/unipacker)☆15Mar 12, 2021Updated 5 years ago
- Eagle files for a STM32F4-DISCOVERY breakout board.☆11Oct 16, 2015Updated 10 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- python script to pull the Cisco global price list, and manipulate it to a usable size☆10Mar 22, 2022Updated 4 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- A Rust command-line tool for decoding Alpha2-based shellcode.☆11Dec 16, 2020Updated 5 years ago
- docker image for sqlmap☆18Nov 4, 2019Updated 6 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Docker files I use☆22Apr 30, 2019Updated 6 years ago
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 12 years ago
- A Forensic Framework for Skype☆65May 21, 2017Updated 8 years ago
- Rust Extensions for the Ruby gem case_transform☆10Jul 27, 2017Updated 8 years ago
- Cisco IOT device SDK in Java☆10Dec 10, 2018Updated 7 years ago