Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
☆205Sep 27, 2021Updated 4 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Sep 6, 2015Updated 10 years ago
- An automated Wireless RogueAP MITM attack framework.☆186May 9, 2019Updated 6 years ago
- Automatically Launch Google Hacking Queries Against A Target Domain☆740Mar 5, 2024Updated last year
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Feb 7, 2018Updated 8 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆984Dec 13, 2017Updated 8 years ago
- Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield☆493Aug 10, 2025Updated 6 months ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- A small python script to check for Cross-Site Tracing (XST)☆133Jan 23, 2016Updated 10 years ago
- MassBleed SSL Vulnerability Scanner☆245Apr 18, 2020Updated 5 years ago
- Find exploits in local and online databases instantly☆1,809Sep 27, 2021Updated 4 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆14Oct 29, 2019Updated 6 years ago
- Retrieve IP Geolocation information☆12Feb 20, 2021Updated 5 years ago
- ☆14May 13, 2018Updated 7 years ago
- Penetration Testing tools - one repo to clone them all... containing latest pen testing tools☆541Nov 25, 2019Updated 6 years ago
- botnet scanner written in python☆14Apr 4, 2018Updated 7 years ago
- Automatically brute force all services running on a target.☆2,222Aug 18, 2024Updated last year
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆313Sep 10, 2018Updated 7 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,901Sep 27, 2021Updated 4 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆511Apr 22, 2018Updated 7 years ago
- [unmaintained] Post-exploitation tool☆181Jan 28, 2016Updated 10 years ago
- 绕过burp破解版的截止日期限制. This is a tool to bypass the cracked version of the burpsuite_pro(Larry_Lau) certification deadline through time revers…☆23May 27, 2022Updated 3 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- a radare2 plugin that decodes packets with Scapy☆34Nov 24, 2017Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 4 years ago
- Improved decoder for Burp Suite☆138Aug 30, 2021Updated 4 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Github for the scripts utilised during Penetration test☆236Jun 12, 2017Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆573Dec 9, 2017Updated 8 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- Collection of PowerShell scripts☆450Dec 18, 2017Updated 8 years ago