Some random exploits that may or may not be useful. Not responsible for misuse.
☆21Dec 12, 2018Updated 7 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- Just some exploits :P☆47Jan 18, 2021Updated 5 years ago
- Debian OpenSSL Predictable PRNG (CVE-2008-0166)☆410Jan 22, 2023Updated 3 years ago
- ☆16Jul 7, 2020Updated 5 years ago
- DigiNinja's bucket_finder utility☆17Aug 30, 2016Updated 9 years ago
- Exploit for PlaySMS 1.4 authenticated RCE☆14Nov 6, 2018Updated 7 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Scripts created to help with post exploitation of a Windows host☆99Feb 1, 2021Updated 5 years ago
- SAMBA Symlink Directory Traversal Manual Exploitation☆32Dec 23, 2019Updated 6 years ago
- ☆33Sep 7, 2020Updated 5 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆260Mar 9, 2021Updated 4 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- ☆32Aug 9, 2019Updated 6 years ago
- C implementation of the file-less UAC exploit☆74Sep 1, 2016Updated 9 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Feb 16, 2020Updated 6 years ago
- Windows binaries from Kali Linux : http://git.kali.org/gitweb/?p=packages/windows-binaries.git;a=summary☆91Jan 4, 2021Updated 5 years ago
- Integration between SIEMs and TAXII services☆10Mar 2, 2023Updated 2 years ago
- A 2 part modified version of the Mobile Mouse 3.6.0.4 exploit.☆14Aug 7, 2023Updated 2 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Arduino project for controlling digital WWA LED strips to act as car DRL and sequential turn signals.☆12Apr 27, 2018Updated 7 years ago
- An isolated environment for DNS cache poisoning attack investigation and demonstration.☆10Nov 22, 2020Updated 5 years ago
- ☆41May 16, 2018Updated 7 years ago
- ☆526Sep 15, 2022Updated 3 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- Undetectable Windows Payload Generation☆10Dec 2, 2017Updated 8 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- Fork of https://code.google.com/p/lorcon/☆12Sep 23, 2013Updated 12 years ago
- A .Net Core MVC webshell☆11Sep 8, 2018Updated 7 years ago
- pinata-csrf-tool☆13Dec 20, 2019Updated 6 years ago
- Cutting-edge research in a practical way☆12Jul 26, 2019Updated 6 years ago
- best tool for hacking via windows cmd☆13Jan 4, 2019Updated 7 years ago
- Impacket is a collection of Python classes for working with network protocols.☆10Jun 15, 2023Updated 2 years ago
- Kubernetes Fundamentals Book☆14Feb 5, 2019Updated 7 years ago
- C++实现键盘记录器☆10Sep 15, 2014Updated 11 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago