Kitsun3Sec / exploitsLinks
Public Exploits
☆10Updated 4 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Updated 3 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- Wireless Pentesting Device☆24Updated 5 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- buffer overflow examples☆22Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Updated 7 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆13Updated 7 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Damn Small SQLi Scanner. (DSSS)☆16Updated 8 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Updated 4 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 5 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 6 years ago
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- ☆33Updated 10 months ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Updated 2 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆16Updated 3 years ago
- ☆29Updated 2 years ago
- Open Redirect Vulnerability Payload List☆11Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated last week
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Simple script to download some missing tools in Kali☆33Updated 5 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 5 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆56Updated 5 years ago