Dsummers91 / HackThisContract
Solutions for http://hackthiscontract.io
☆8Updated 7 years ago
Alternatives and similar repositories for HackThisContract:
Users that are interested in HackThisContract are comparing it to the libraries listed below
- ☆7Updated 7 years ago
- ☆30Updated 8 years ago
- Kindly Win x86/x64 DLL Injector☆16Updated 5 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Updated 7 years ago
- ☆24Updated 7 years ago
- ~ BannerGrab☆26Updated 8 years ago
- My presentations from different conferences☆15Updated 6 years ago
- Various Scripts for Mobile Pen-testing with Frida☆75Updated 8 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit☆25Updated 8 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆84Updated 5 years ago
- Source Code Intelligence☆30Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- Some Of Huawei Routers Exploits☆13Updated 8 years ago
- BlackHat Europe 2017 Slides☆26Updated 6 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 6 years ago
- Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)☆41Updated 3 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 7 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- A simple Ubuntu / Redhat / CentOS and Debian Audit Script☆9Updated 4 years ago
- An iPhone 7 running below iOS 11 can be hijacked by a nearby hostile WiFi router.☆36Updated 7 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- Some exploits for ZeroNights 0x03☆37Updated 9 years ago
- XXE vulnerability demo☆22Updated 10 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- Cgiemail - Source Code Disclosure/LFI☆15Updated 8 years ago
- ☆20Updated 6 years ago
- shell backdoor website☆9Updated 6 years ago
- XMPP Man-in-the-Middle, quick & dirty☆41Updated 10 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Updated 5 years ago
- Slides & Video Demos of My Talk Titled Browser Exploits? Grab ’em by the Collar! @ Brucon0x09Updated 7 years ago