We store attacks and exploits that we've found useful in our research
☆13Jun 4, 2015Updated 10 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago
- POC: Heap buffer overflow in the networking code in the XNU operating system kernel☆14Feb 25, 2024Updated 2 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- advanced Perl Backdoor☆13Jun 6, 2015Updated 10 years ago
- ELF packer for i386☆32Dec 14, 2015Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- web based nmap scan collection and search☆19May 13, 2021Updated 4 years ago
- ☆17Sep 9, 2022Updated 3 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- ☆18Sep 22, 2018Updated 7 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- List of Services (File Sharing, URL shorteners...)☆19Oct 4, 2020Updated 5 years ago
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 8 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- Simple SSH brute-forcer written in Go☆24May 29, 2016Updated 9 years ago
- PROJECT PAUSED 1/11/22, Tracking Threat Actor Emails in Phishing Kits. CC @PhishKitTracker on twitter if you find a #threatactoremail in …☆102Jan 11, 2022Updated 4 years ago
- Mainframe Transfer: PROTOCOL☆28Mar 26, 2021Updated 4 years ago
- Various tools to track the Mirai botnet☆20Nov 3, 2016Updated 9 years ago
- ☆27Jul 21, 2020Updated 5 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆65Jun 26, 2018Updated 7 years ago
- MikroTik RouterOS Winbox未经身份验证的任意文件读/写漏洞☆30Dec 16, 2018Updated 7 years ago
- WebFuzzer - Web Application Security Scanner by Cystack Team☆25Mar 14, 2017Updated 8 years ago
- Net2PCAP is a simple network-to-pcap capture file for Linux. Its goal is to be as simple as possible to be used in hostile environments☆40Jul 17, 2013Updated 12 years ago
- Mirai Botnet DB Project☆26Mar 20, 2019Updated 6 years ago
- reverse shell with tty emulation, openssl encryption and support for multiple tcp proxies☆28Apr 3, 2016Updated 9 years ago
- ☆34Mar 7, 2020Updated 5 years ago
- IKE fuzzer☆29May 29, 2015Updated 10 years ago
- Tools and documentation for TETRA decoding☆35Oct 8, 2024Updated last year
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- relros.c applies RELRO to static binaries, and static_to_dyn.c applies ASLR to static binaries.☆34Jun 25, 2018Updated 7 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆36Apr 14, 2015Updated 10 years ago
- ME314 Introduction to Data Science and Big Data Analytics 2018☆10Jul 29, 2018Updated 7 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- ☆34Sep 22, 2017Updated 8 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37May 20, 2013Updated 12 years ago