Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see the Unicode. Please do not intentionally abuse these exploits.
☆42Nov 13, 2018Updated 7 years ago
Alternatives and similar repositories for Crash-iOS-Exploit
Users that are interested in Crash-iOS-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This Exploit allows arbitrary memory writes and reads. Running the specified payload within this package will write to the device's main …☆28Jul 24, 2017Updated 8 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆20Jan 22, 2017Updated 9 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Payload delivery via URL and some social engineering.☆17Jul 13, 2024Updated last year
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆20Nov 21, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Standardizing Security Titles☆13Dec 31, 2025Updated 3 months ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Use…☆26Jan 29, 2018Updated 8 years ago
- Black Hat Python workshop for Disobey 2019☆30Feb 19, 2019Updated 7 years ago
- Instagram Bruteforce For Hacking Instagram Accounts☆17Apr 4, 2020Updated 6 years ago
- Tools for hunting security threats☆12Feb 4, 2020Updated 6 years ago
- Make Windows LNK file with python (pylnk)☆64Jun 4, 2016Updated 9 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆24May 26, 2018Updated 7 years ago
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 4 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- A Simple JS and PHP Botnet☆30Mar 12, 2019Updated 7 years ago
- find all "blackhole" directories with a huge amount of filesystem entries in a flat structure☆17Sep 20, 2022Updated 3 years ago
- The iOS 11 dock on iOS 10.☆10Jan 8, 2018Updated 8 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆19Feb 8, 2025Updated last year
- Minecraft Classic server written in Elixir.☆13Apr 4, 2021Updated 5 years ago
- A shell script to build fancy DMGs☆11Sep 10, 2018Updated 7 years ago
- iCloud Apple iD BruteForcer☆12Jan 2, 2015Updated 11 years ago
- A small, fluid, low-interaction honeypot☆18May 20, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A Windows script to monitor registry hives for modifications & notify you when modifications have occured.☆23Oct 28, 2019Updated 6 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆56Aug 30, 2018Updated 7 years ago
- A cross-platform custom NOR firmware loader and custom IPSW generator for the iPhone☆16Oct 11, 2014Updated 11 years ago
- ☆10Mar 30, 2015Updated 11 years ago
- Proof of concept for CVE-2018-4150 by @cmwdotme☆14May 8, 2018Updated 7 years ago
- iDevice Jailbreak Utilities☆20Dec 31, 2010Updated 15 years ago
- This tool allows you mass play any YouTube video, terminate apps and rename Chromecast device(s) obtained from Shodan.io☆163Aug 28, 2022Updated 3 years ago
- Electra iOS 11.0 - 11.1.2 jailbreak toolkit based on async_awake, with a force installation of cydia on every run☆10Mar 3, 2018Updated 8 years ago
- ☆74Jan 25, 2018Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆21Aug 19, 2017Updated 8 years ago
- ☆33May 2, 2020Updated 5 years ago
- Literally spray blind xss payloads everywhere.☆26Feb 22, 2022Updated 4 years ago
- Dynamic Callbacks can be used for re-establishing communication with C2 infrastructure and for achieving persistence by using different m…☆15Oct 17, 2018Updated 7 years ago
- windows Local privilege escalation for xp sp3+ (x86/x64)☆12Oct 26, 2017Updated 8 years ago
- Collection of Malware Lures☆23Oct 8, 2021Updated 4 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆17Nov 23, 2020Updated 5 years ago