0xdea / exploitsLinks
A handy collection of my public exploits, all in one place.
☆669Updated last month
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- [Linux] Two Privilege Escalation techniques abusing sudo token☆727Updated 6 years ago
- Payload Development Framework☆823Updated this week
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆450Updated last month
- ☆1,182Updated 8 years ago
- kernel privilege escalation enumeration and exploitation framework☆698Updated 7 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆850Updated 7 months ago
- Automatic exploit generation for simple linux pwn challenges.☆322Updated 2 years ago
- Linux PAM Backdoor☆358Updated 2 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆977Updated 8 years ago
- Modern tactical exploitation toolkit.☆852Updated last month
- A collection of links related to VMware escape exploits☆1,478Updated last year
- fireELF - Fileless Linux Malware Framework☆676Updated 6 years ago
- Tool for extracting information from newly spawned processes☆774Updated 7 months ago
- Search gtfobins and lolbas files from your terminal☆462Updated 3 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆680Updated 6 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆703Updated 5 years ago
- Code for my 0x00sec.org posts☆330Updated 5 years ago
- Vulnerability examples.☆412Updated last year
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆567Updated last year
- Vulnerable server used for learning software exploitation☆1,086Updated 5 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆425Updated 3 years ago
- Token Privilege Research☆866Updated 8 years ago
- Bash post exploitation toolkit☆744Updated 2 years ago
- Micro$oft Windows Hacking Pack☆524Updated 7 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Updated 3 months ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆384Updated 5 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆759Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆545Updated 4 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆573Updated last year
- Tricks for penetration testing☆581Updated 5 years ago