Kitsun3Sec / exploitsLinks
Public Exploits
☆10Updated 4 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago
- Burp suite Certificate modification tool☆18Updated 2 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆19Updated 2 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 5 years ago
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- ☆13Updated 7 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated last year
- Red Team Tool Kit☆16Updated 6 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Hackthebox tools☆12Updated 6 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆26Updated 7 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- MS17-010☆12Updated 7 years ago
- Install and upgrade projectdiscovery tools☆10Updated 3 years ago
- Notes on Active Directory analysis and exploitation☆11Updated 6 years ago
- Wordlist generator☆16Updated 4 years ago
- Generates Malicious Macro and Execute Powershell or Shellcode via MSBuild Application Whitelisting Bypass.☆12Updated 5 years ago
- Script to provision a curated set of pentesting tools into a Kali (supported) box.☆13Updated 3 years ago
- ☆29Updated 2 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- ☆19Updated 7 years ago
- ☆13Updated 2 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Malduino compatible USB rubber ducky payloads☆14Updated 6 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 8 years ago