0xdea / exploitsLinks
A handy collection of my public exploits, all in one place.
☆667Updated this week
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆447Updated last week
- [Linux] Two Privilege Escalation techniques abusing sudo token☆721Updated 6 years ago
- Payload Development Framework☆817Updated 2 weeks ago
- kernel privilege escalation enumeration and exploitation framework☆697Updated 7 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆701Updated 5 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆679Updated 6 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆977Updated 7 years ago
- ☆1,176Updated 8 years ago
- Linux PAM Backdoor☆354Updated 2 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆569Updated last year
- Modern tactical exploitation toolkit.☆854Updated this week
- fireELF - Fileless Linux Malware Framework☆674Updated 6 years ago
- Tool for extracting information from newly spawned processes☆769Updated 6 months ago
- Code for my 0x00sec.org posts☆329Updated 5 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆380Updated 2 years ago
- All my infosec notes I have been building up over the years☆334Updated 8 months ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆385Updated 4 years ago
- Search gtfobins and lolbas files from your terminal☆461Updated 3 years ago
- Automatic exploit generation for simple linux pwn challenges.☆321Updated 2 years ago
- socks4 reverse proxy for penetration testing☆621Updated 7 years ago
- Tricks for penetration testing☆579Updated 4 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Updated 2 months ago
- Vulnerability examples.☆411Updated last year
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆848Updated 6 months ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆597Updated 10 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆526Updated 4 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,064Updated 5 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆425Updated 3 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- A collection of links related to VMware escape exploits☆1,475Updated last year