Custom exploits
☆28Apr 8, 2024Updated 2 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 10 months ago
- My challenges for SECCON CTF 2022 Finals☆18Feb 15, 2023Updated 3 years ago
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆24Aug 28, 2024Updated last year
- ☆12Jan 10, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Linux rootkit for educational purposes☆36Mar 27, 2024Updated 2 years ago
- ☆16Apr 12, 2023Updated 3 years ago
- Lightweight x86-64 instruction length disassembler (LDE)☆35Jun 17, 2023Updated 2 years ago
- ☆12Dec 20, 2023Updated 2 years ago
- QCOM's Proprietary Vendor Sources☆14Apr 18, 2022Updated 4 years ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Aug 15, 2024Updated last year
- Discover which process execute a hunted binary inside macOS☆29Dec 15, 2021Updated 4 years ago
- Generating unique key using Device Attestation method☆11Feb 27, 2025Updated last year
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Automatic monitor github cve using Github Actions☆10Dec 16, 2024Updated last year
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- Disassemble V8 Ignition bytecode.☆12Jan 2, 2024Updated 2 years ago
- HITB SECCONF CTF 2023. Developed with ❤️ by Hackerdom team and HITB.☆16Sep 6, 2023Updated 2 years ago
- Scripts made for the ATTiny85 aka DigiSpark to bruteforce Android PINs☆19Dec 30, 2023Updated 2 years ago
- 蚁剑反制马☆13Aug 16, 2023Updated 2 years ago
- Attack/Defense CTF scoreboard parser☆14Aug 20, 2022Updated 3 years ago
- Looney Tunables Local privilege escalation (CVE-2023-4911) workshop☆16Oct 1, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PatchFuzz: Fuzzing for JavaScript Engine Incomplete Security Patches☆20Dec 17, 2025Updated 4 months ago
- Root隐藏辅助模块, 是一个Magisk模块, 作用是用来隐藏Root躲避软件的检测☆11Nov 12, 2024Updated last year
- ☆21Dec 24, 2022Updated 3 years ago
- Collection of Web3 Audits and Publications by ChainLight of Theori☆14Oct 30, 2023Updated 2 years ago
- Fixes to pyobd for modern hardware interfaces☆11Oct 3, 2015Updated 10 years ago
- Proof-of-Concept of exploits that may be published☆23Oct 24, 2024Updated last year
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆16Sep 19, 2020Updated 5 years ago
- These are tools I cheated with the help of ChatGPT to help me with Penetration Testing and Red Teaming☆14Feb 24, 2024Updated 2 years ago
- ConFuzz is an advanced FPGA configuration engine fuzzing and rapid prototyping framework based on boofuzz and OpenOCD.☆16Apr 1, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A tool combining DWARF info and source to search for kernel heap objects☆25Dec 23, 2025Updated 4 months ago
- ☆10Jul 3, 2021Updated 4 years ago
- Services from training sessions of A&D season☆12Jun 1, 2021Updated 4 years ago
- Universal root exploit for the linux kernel☆37Apr 30, 2024Updated 2 years ago
- An Apple Silicon hooking library written in C☆13Sep 19, 2021Updated 4 years ago
- Attack-defense CTF training organized by dtl on 23 Jul, 2023☆12Jul 24, 2023Updated 2 years ago
- ghjk is a programmable runtime manager and an attempt at a successor for asdf.☆10Mar 11, 2026Updated last month