Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
☆207Sep 27, 2021Updated 4 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆41Sep 6, 2015Updated 10 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Feb 7, 2018Updated 8 years ago
- Automatically Launch Google Hacking Queries Against A Target Domain☆741Mar 5, 2024Updated 2 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆987Dec 13, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield☆496Aug 10, 2025Updated 8 months ago
- An automated Wireless RogueAP MITM attack framework.☆186May 9, 2019Updated 6 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆14Oct 29, 2019Updated 6 years ago
- Retrieve IP Geolocation information☆13Feb 20, 2021Updated 5 years ago
- A small python script to check for Cross-Site Tracing (XST)☆133Jan 23, 2016Updated 10 years ago
- MassBleed SSL Vulnerability Scanner☆247Apr 18, 2020Updated 5 years ago
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Find exploits in local and online databases instantly☆1,808Sep 27, 2021Updated 4 years ago
- Sr. Penetration Tester. Creator of Sn1per. Top 20 worldwide on @BugCrowd in 2016. OSCE/OSCP/CISSP/Security+☆27Feb 10, 2026Updated 2 months ago
- Fast subdomains enumeration tool for penetration testers☆14Feb 3, 2020Updated 6 years ago
- botnet scanner written in python☆14Apr 4, 2018Updated 8 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆16Jun 27, 2022Updated 3 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,912Sep 27, 2021Updated 4 years ago
- ☆14May 13, 2018Updated 7 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- Penetration Testing tools - one repo to clone them all... containing latest pen testing tools☆541Nov 25, 2019Updated 6 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Automatically brute force all services running on a target.☆2,241Aug 18, 2024Updated last year
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆313Sep 10, 2018Updated 7 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆509Apr 22, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆1,787Nov 24, 2024Updated last year
- [unmaintained] Post-exploitation tool☆181Jan 28, 2016Updated 10 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect☆133Feb 11, 2022Updated 4 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago