0xdea / exploitsLinks
A handy collection of my public exploits, all in one place.
☆669Updated 3 weeks ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆450Updated 3 weeks ago
- Payload Development Framework☆821Updated last month
- Automatic exploit generation for simple linux pwn challenges.☆321Updated 2 years ago
- ☆1,179Updated 8 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆977Updated 7 years ago
- Search gtfobins and lolbas files from your terminal☆462Updated 3 years ago
- kernel privilege escalation enumeration and exploitation framework☆698Updated 7 years ago
- fireELF - Fileless Linux Malware Framework☆677Updated 6 years ago
- Linux PAM Backdoor☆357Updated 2 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆701Updated 5 years ago
- Tool for extracting information from newly spawned processes☆772Updated 6 months ago
- A collection of links related to VMware escape exploits☆1,478Updated last year
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆679Updated 6 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆566Updated last year
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆380Updated 2 years ago
- Tricks for penetration testing☆580Updated 5 years ago
- Bash post exploitation toolkit☆744Updated 2 years ago
- Code for my 0x00sec.org posts☆330Updated 5 years ago
- All my infosec notes I have been building up over the years☆335Updated 9 months ago
- Modern tactical exploitation toolkit.☆853Updated 3 weeks ago
- Various local exploits☆145Updated 3 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆849Updated 7 months ago
- Python PTY backdoors - full PTY or nothing!☆749Updated 11 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆384Updated 4 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆574Updated last year
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆425Updated 3 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- Exploit Development, Reverse Engineering & Cryptography☆256Updated 3 months ago
- Herramienta para evadir disable_functions y open_basedir☆468Updated 2 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,132Updated last month