Kitsun3Sec / exploitsLinks
Public Exploits
☆10Updated 4 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆19Updated 2 years ago
- ☆13Updated 7 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 8 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- ☆33Updated 5 months ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- Automation scripts in preparation for PWK/OSCP labs☆17Updated 3 years ago
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Notes on Active Directory analysis and exploitation☆11Updated 6 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- MS17-010☆12Updated 7 years ago
- Burp suite Certificate modification tool☆18Updated 2 years ago
- Hackthebox tools☆12Updated 6 years ago
- ☆29Updated 2 years ago
- ☆17Updated 6 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- Automated Pentest Recon Scanner☆14Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 4 years ago
- Wordlist generator☆16Updated 4 years ago
- ☆9Updated 5 years ago
- ☆13Updated 2 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Red Team Tool Kit☆16Updated 6 years ago
- buffer overflow examples☆22Updated 7 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- Auto Web Vulnerability Scanning Framework☆10Updated 9 years ago
- Find open databases - Powered by Binaryedge.io☆15Updated 5 years ago