649 / TOR-0dayLinks
JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim must visit website using correct version of Tor in order to be potentially deanonymized.
☆19Updated 8 years ago
Alternatives and similar repositories for TOR-0day
Users that are interested in TOR-0day are comparing it to the libraries listed below
Sorting:
- Proof of Concept for CVE-2018-11776☆21Updated 7 years ago
- 0x88 exploit pack Decoded☆28Updated 11 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆17Updated 2 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- This version touches disk for registry persistence.☆26Updated 9 years ago
- ☆12Updated 11 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- My metasploit modules☆11Updated 10 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆37Updated 7 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- ☆24Updated 7 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆23Updated 7 years ago
- PoC code for crashing windows active directory☆35Updated 7 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- Scripts and tools for ISM hacking☆16Updated 7 years ago
- Mobile Application Vulnerability Detection☆12Updated 8 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆33Updated 7 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Updated 6 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago