Custom exploits
☆28Apr 8, 2024Updated last year
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- Attachment and official writeup for D^3CTF 2025's Pwn challenge - d3kheap2☆16Jul 2, 2025Updated 8 months ago
- Automatic monitor github cve using Github Actions☆10Dec 16, 2024Updated last year
- Scripts made for the ATTiny85 aka DigiSpark to bruteforce Android PINs☆19Dec 30, 2023Updated 2 years ago
- My challenges for SECCON CTF 2022 Finals☆18Feb 15, 2023Updated 3 years ago
- A firebeam plugin that exploits the CVE-2024-26229 vulnerability to perform elevation of privilege from a unprivileged user☆41Aug 15, 2024Updated last year
- Add debugging tools to an existing initramfs, even if it is for a foreign architecture☆24Aug 28, 2024Updated last year
- ☆28Jan 22, 2026Updated last month
- Linux rootkit for educational purposes☆35Mar 27, 2024Updated last year
- Enhanced QDLink without handbreak detection and many other restrictions.☆11Apr 13, 2023Updated 2 years ago
- PhishX - The Complete Spear Phishing Tool☆14Sep 13, 2018Updated 7 years ago
- Universal root exploit for the linux kernel☆38Apr 30, 2024Updated last year
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆10Jan 5, 2024Updated 2 years ago
- Challenges for ImaginaryCTF 2024☆34Sep 5, 2025Updated 5 months ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆13May 9, 2020Updated 5 years ago
- 在5MB的内存和硬盘以内,实现FRPC的WebUI管理界面,抛弃臃肿的Java和MySQL☆12Feb 10, 2023Updated 3 years ago
- Bypass Xiaomi RSA 256 EDL Auth☆13Sep 2, 2025Updated 6 months ago
- Challenges from pbctf 2020☆34Dec 16, 2020Updated 5 years ago
- Android pin cracker☆13Mar 25, 2022Updated 3 years ago
- Case study using dotfurther's Open Discover Platform with the RavenDB document store to rapidly create a full-text search/eDiscovery/info…☆12May 28, 2024Updated last year
- A chess engine made in rust cause I hate myself☆11May 30, 2025Updated 9 months ago
- ☆12Jul 16, 2017Updated 8 years ago
- A set of NRF24 apps for the Flipper Zero running an unmodified original firmware.☆10Aug 25, 2023Updated 2 years ago
- ghjk is a programmable runtime manager and an attempt at a successor for asdf.☆11Feb 20, 2026Updated last week
- My solutions for pwn and reversing challenges☆10Mar 18, 2018Updated 7 years ago
- Patch files☆10Aug 8, 2022Updated 3 years ago
- ☆11Jul 19, 2020Updated 5 years ago
- I wrote this script to uninstall preinstalled apps on my phone. This script is for Linux. You will also need adb installed on your pc.☆13Sep 2, 2022Updated 3 years ago
- Quickly Access and Infiltrate ADB Devices With Shodan API☆11Jul 27, 2025Updated 7 months ago
- ADB Usage Complete / ADB 用法大全☆12Jan 17, 2022Updated 4 years ago
- Gootool for Android☆13Jul 21, 2023Updated 2 years ago
- SocksSharp provides support for Socks4/4a/5 proxy servers to HttpClient☆12Feb 3, 2021Updated 5 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- ☆11Feb 11, 2026Updated 3 weeks ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- 2024 - CANCELED AT REQUEST OF SAMSUNG. This Magisk Module was going to attempt to add missing engineering/combination framework to the de…☆11Jul 18, 2024Updated last year
- ☆11Feb 3, 2026Updated last month
- Reverse engineered Hyundai Kona Electric CAN signal database☆17Jan 16, 2025Updated last year