RAR-NextgenerationAI-expliot (use ai and more new techniques)
☆21May 5, 2025Updated 11 months ago
Alternatives and similar repositories for RAR-NextgenerationAI-expliot
Users that are interested in RAR-NextgenerationAI-expliot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This code implements an Advanced Prompt Hacking Tester, which allows users to test the responses of an AI system by generating various ty…☆12Apr 14, 2024Updated last year
- A malicous Golang Package☆15Apr 21, 2025Updated 11 months ago
- This code is a web scanner tool designed to find vulnerabilities and file upload points on a website. It uses various techniques to bypas…☆21May 4, 2025Updated 11 months ago
- Here we are gather all Nuclei Templates that are Publically available.☆15Apr 28, 2024Updated last year
- A tool for injecting custom JavaScript payloads into PDF files for penetration testing and XSS proof-of-concept generation.☆19Jan 10, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Hellokitty Ransomware Source Code☆18Oct 7, 2023Updated 2 years ago
- Conti Ransomware Source Code☆19Mar 1, 2022Updated 4 years ago
- Simple script to bulk check if IPs match networks☆11Jan 11, 2022Updated 4 years ago
- A script to automatically generate TWRP-compatible device tree from a boot/recovery image☆11Apr 10, 2021Updated 5 years ago
- Xninjaz is a powerful and versatile multi-vulnerability scanner designed to detect various web application vulnerabilities, including Loc…☆11Oct 16, 2025Updated 5 months ago
- kali linux tutorials and commands for ethical hackers and penetration testing☆10Jul 6, 2025Updated 9 months ago
- CVE-2024-6387 with auto ip scanner and auto expliot☆11Jul 4, 2024Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 11 months ago
- ☆18Jun 25, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Installation: Install the NetHunter-Store app from: https://store.nethunter.com/ From the Kali NetHunter Store, install Termux, NetHunt…☆16Dec 18, 2021Updated 4 years ago
- X-wpbf is a wordpress bruteforce tool to find admin or user passwords via the admin login of the target website☆12Oct 16, 2025Updated 5 months ago
- Python botnet☆12Aug 15, 2015Updated 10 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- ☆13May 21, 2025Updated 10 months ago
- ☆12Jul 4, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Pyload RCE with js2py sandbox escape☆18Oct 26, 2024Updated last year
- This is a Telegram bot designed to back up messages and media files from Telegram chats to a local file system and a SQLite database. It …☆15Aug 20, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Bullet-proof your custom GPT system prompt security with KEVLAR, the ultimate prompt protector against rules extraction, prompt injection…☆19Apr 12, 2024Updated last year
- A Magic Mask to Alter Android System Systemless-ly☆15Jan 1, 2024Updated 2 years ago
- Crypto trading assistant that uses sentiment analysis on scraped web data to provide analysis. Feel free to fork and test☆15Feb 2, 2018Updated 8 years ago
- A tool that uses public proxies to find and scan sites for sql injection vulnerability.☆14Oct 16, 2025Updated 5 months ago
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 11 months ago
- Эксплойт для уязвимости CVE-2024-0039 на Android, который позволяет выполнять произвольный код через MP4 файл. Этот репозиторий создан дл…☆12May 29, 2024Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆15Mar 7, 2024Updated 2 years ago
- A PoC exploit for CVE-2024-4577 - PHP CGI Argument Injection Remote Code Execution (RCE)☆10Jul 12, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- Xnow-ip is a tool created to find out the IP address of a website, suitable for those of you who are just learning hacking.☆14Oct 16, 2025Updated 5 months ago
- ☆25Sep 17, 2025Updated 6 months ago
- Brew Local Privilege Escalation exploit on Intel macOS☆19Mar 6, 2024Updated 2 years ago
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- example using NtCreateUserProcess in rust☆19Jan 20, 2025Updated last year
- 💎 | RubyRedOps is a repository for advanced Red Team techniques and offensive malware, focused on Ruby☆11Apr 21, 2025Updated 11 months ago