LOCAL ROOT EXPLOITS
☆39Jul 30, 2018Updated 7 years ago
Alternatives and similar repositories for local-root-exploits
Users that are interested in local-root-exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- couchdb remote command exec.☆14Mar 27, 2018Updated 8 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated 2 months ago
- IDA反-反调试插件 IDAStealth v1.3.3, created 06/28/2011, Jan Newger☆21Apr 4, 2018Updated 8 years ago
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Simple hosting and data sharing on Tor network☆11Nov 30, 2016Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- WSLTools☆23Jul 5, 2018Updated 7 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- ☆19Mar 16, 2021Updated 5 years ago
- A Twitter Bot using Tweepy. It will also check if there is an internet connection available.☆11Oct 29, 2017Updated 8 years ago
- ☆30Jan 31, 2024Updated 2 years ago
- how to hack pattern lock☆15Dec 27, 2020Updated 5 years ago
- Web Sight Back-end Community Edition☆43Dec 7, 2022Updated 3 years ago
- This tool helps you pentest THE PAST of a website.☆15Jul 13, 2025Updated 9 months ago
- Hijacker for Linux Phones☆18Jul 16, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆13Dec 7, 2023Updated 2 years ago
- 🤓 Geeks Eid Mubarak 🎊 كل عام وانتم بخير 🎉☆15Jun 29, 2017Updated 8 years ago
- Misuse cases of Cryptography in real world software products☆11Nov 4, 2018Updated 7 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Remote Sniffer: Tool for sending sniffered PCAP traffic in realtime into Winows/PC box with GUI Wireshark☆14Jul 9, 2020Updated 5 years ago
- Facilitates the indexing of content from a CSV into ElasticSearch☆27Oct 3, 2013Updated 12 years ago
- A debugger / emulator for Ghidra☆14Oct 30, 2019Updated 6 years ago
- My attempt at writing exploit POCs for various CVEs☆15Feb 8, 2020Updated 6 years ago
- This is a compilation of various shells that I had found in the wild.☆15May 30, 2013Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆10Jan 22, 2016Updated 10 years ago
- Shellcode runner to execute malicious payload and bypass AV☆14Nov 28, 2021Updated 4 years ago
- Script and resources to execute shell commands using access to a PostgreSQL service☆14Oct 24, 2024Updated last year
- VPN & IP Changer☆10Aug 6, 2024Updated last year
- A lightweight http server for linux☆18Apr 1, 2026Updated 3 weeks ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆91Oct 18, 2019Updated 6 years ago
- WebSocket API description and implementations for several programming languages☆13Feb 9, 2026Updated 2 months ago
- Windows SSPI wrapper in prue python☆15Nov 29, 2023Updated 2 years ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆21Jul 4, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆37Nov 4, 2017Updated 8 years ago
- ARCHIVED: Use 'peh' instead☆16May 4, 2021Updated 4 years ago
- Socks proxy server using powershell. Supports local and reverse connections for pivoting.☆11Oct 7, 2020Updated 5 years ago
- A Python command-line tool for automatically detecting and cropping portrait photos with transparent backgrounds.☆11Aug 13, 2025Updated 8 months ago
- A C# DLL to Dump LSA Secrets☆59Feb 5, 2018Updated 8 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆81Jun 30, 2018Updated 7 years ago
- I am still working on it☆11Apr 30, 2020Updated 5 years ago