Challenges and vulnerabilities exploitation.
☆60Dec 26, 2020Updated 5 years ago
Alternatives and similar repositories for exploits_challenges
Users that are interested in exploits_challenges are comparing it to the libraries listed below
Sorting:
- Exploiting challenges in Linux and Windows☆121Dec 22, 2019Updated 6 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- RWX CTF Team Writeups☆10Dec 24, 2019Updated 6 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- Collection of things made during my preparation to take on OSCE☆189Feb 24, 2022Updated 4 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆82Jul 7, 2018Updated 7 years ago
- CTFs I've played so far☆17Feb 1, 2025Updated last year
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- Some of my public exploits☆52Sep 15, 2020Updated 5 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- ☆105Dec 9, 2019Updated 6 years ago
- CVE-2018-3191 反弹shell☆63Oct 23, 2018Updated 7 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- ERPScan Public POC for CVE-2018-2636☆22Feb 1, 2018Updated 8 years ago
- Game of Thrones hacking CTF (Capture the flag)☆64Mar 7, 2025Updated 11 months ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- ☆30Nov 25, 2025Updated 3 months ago
- Viruses for the public to test.☆10Aug 11, 2018Updated 7 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- ☆43Aug 30, 2018Updated 7 years ago
- ☆30Dec 4, 2018Updated 7 years ago
- 一个专门用于开发安全工具的HTTP类库.☆22Dec 5, 2019Updated 6 years ago
- Mobile Pentesting Guide (WIP)☆25May 13, 2020Updated 5 years ago
- burp extender for fuzzing☆10Aug 10, 2018Updated 7 years ago
- CVE-2018-15982_EXP_IE☆12Dec 12, 2018Updated 7 years ago
- ☆15Aug 12, 2009Updated 16 years ago
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- ☆29Nov 4, 2020Updated 5 years ago
- Real world and CTFs exploiting web/binary POCs.☆79Jul 5, 2020Updated 5 years ago