Script to Exploit Buffer_overflow (0)-Day vulnerability & executes the command remotely on target system.
☆16Nov 7, 2020Updated 5 years ago
Alternatives and similar repositories for exploitbuffer
Users that are interested in exploitbuffer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Make Your Passwords Cracking easier! Crack any kinda pwds within just few minutes!!☆19Oct 26, 2020Updated 5 years ago
- Download Youtube Video's in Both MP3 & MP4 format! | Multi video's + playlist Downloader Support☆10Nov 28, 2020Updated 5 years ago
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆16Oct 26, 2020Updated 5 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆16Nov 10, 2020Updated 5 years ago
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆11Jan 2, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- For Spamming | BOT (Spam anywhere) or in Social Media Comment Section!☆12Jan 1, 2021Updated 5 years ago
- This Tool is a Powerful dos & ddos Tool to create heavy load on the Servers, exhausting the resources thus, making web servers nonrespon…☆22Oct 26, 2020Updated 5 years ago
- Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit☆14Mar 16, 2022Updated 4 years ago
- A Powerfull BUG HUNTING TOOL. Supports SQL, XSS, PHP code execution, SSRF,.... I had Appended My Own Payloads which I had founded during …☆56Jun 8, 2021Updated 4 years ago
- NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive K…☆13Jan 10, 2021Updated 5 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- Script to auto generate Python package info on requirements.txt☆11Jul 28, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- #Simple program to track someone by send malicious link☆13May 17, 2020Updated 5 years ago
- rootX is a modern, feature-rich IRC client built with Python and Tkinter, offering a clean and intuitive graphical interface while mainta…☆13Dec 8, 2025Updated 4 months ago
- Wifi network scanning tool for capturing WPA/WPA2 Handshakes☆27Jan 19, 2021Updated 5 years ago
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆14Aug 8, 2024Updated last year
- World's most Powerful and Advanced Cross Site Scripting Software☆28Jan 5, 2020Updated 6 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆17Mar 22, 2026Updated last month
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Black-Tool v5.0.0 ⬛☆79Apr 4, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Describe how to use ffuf different options with examples☆14Jun 13, 2022Updated 3 years ago
- Protect your computer / rooted-smartphone !☆19Apr 6, 2025Updated last year
- Instantly search the web for hacked data. Check if you appear in any database leaks.☆15Nov 22, 2018Updated 7 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- An open-source .NET Ransomware☆23Aug 2, 2021Updated 4 years ago
- Automatic tool using for crawling code to find low-hang fruit vulnerabilities - Based on OWASP Secure Code Review Guide☆21Aug 31, 2020Updated 5 years ago
- ☆13Aug 29, 2021Updated 4 years ago
- [Phishing Tool]☆17Jul 18, 2025Updated 9 months ago
- Scapy 802.1X exploitation framework.☆20Mar 2, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CVE-2019-0230 Exploit POC☆15Aug 21, 2020Updated 5 years ago
- A list of notes that I've compiled over time to help with CTF's and the OSCP exam.☆10Dec 29, 2020Updated 5 years ago
- rwwwshell: Getting a reverse shell with Mr. Robot ;)☆36Jul 16, 2020Updated 5 years ago
- Collection of Cyber Threat Intelligence sources from the deep and dark web☆18Feb 10, 2022Updated 4 years ago
- Tool Bash para automatizar y penetrar fallas de SQL en sitios webs.☆28Jun 4, 2025Updated 10 months ago
- Notes and Commands for CTFs☆24Apr 28, 2020Updated 6 years ago
- Computer Science (data structures, algorithms), challenges solutions from LeetCode, Advent Of Code, Project Euler etc.☆12Oct 25, 2025Updated 6 months ago