Some of my public exploits
☆52Sep 15, 2020Updated 5 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆63Sep 10, 2019Updated 6 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- ☆11Mar 30, 2017Updated 8 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- CVE-2019-2725 bypass pocscan and exp☆11Jun 21, 2019Updated 6 years ago
- ☆26Dec 8, 2025Updated 3 months ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- ☆12Jan 13, 2018Updated 8 years ago
- Scans for .NET Deserialization Bugs in .NET Assemblies☆81Nov 21, 2024Updated last year
- PoC for CVE-2019-19844(https://www.djangoproject.com/weblog/2019/dec/18/security-releases/)☆100Dec 24, 2019Updated 6 years ago
- Weblogic CVE-2020-14645 UniversalExtractor JNDI injection getDatabaseMetaData()☆80Jul 20, 2020Updated 5 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Jan 24, 2021Updated 5 years ago
- Simple Live Data Collection Tool☆22Oct 4, 2020Updated 5 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Aug 12, 2019Updated 6 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆447Sep 7, 2022Updated 3 years ago
- ☆18Jul 22, 2023Updated 2 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- ExtendedMacro - BurpSuite plugin providing extended macro functionality☆15Jan 13, 2021Updated 5 years ago
- PoC for CVE-2020-1015☆39May 16, 2020Updated 5 years ago
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- From SQL injection to root shell with CVE-2016-6662 by MaYaSeVeN☆29Jul 22, 2017Updated 8 years ago
- A malicious LDAP server for JNDI injection attacks☆76Nov 15, 2024Updated last year
- A PoC of a privilege escalation vulnerability in the Realtek rtkio64 Windows driver.☆20Jul 6, 2020Updated 5 years ago
- Apache Log4j 1.2.X存在反序列化远程代码执行漏洞☆78Dec 25, 2019Updated 6 years ago
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- Fork of ligolo-ng with exec and service capability☆17Oct 30, 2023Updated 2 years ago
- CVE-2020-5410 Spring Cloud Config directory traversal vulnerability☆31Jun 16, 2020Updated 5 years ago
- Jboss Java Deserialization RCE (CVE-2017-12149)☆13Aug 22, 2019Updated 6 years ago
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- CVE-2019-0230 & s2-059 poc.☆36Aug 21, 2020Updated 5 years ago
- Challenges and vulnerabilities exploitation.☆60Dec 26, 2020Updated 5 years ago
- A rogue DNS detector☆24Nov 20, 2025Updated 4 months ago
- A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis☆13Mar 22, 2022Updated 4 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- This burpsuite extender provides a solution on testing Enterprise applications that involve security Authorization tokens into every HTTP…☆47Feb 27, 2019Updated 7 years ago