☆28Jun 18, 2019Updated 6 years ago
Alternatives and similar repositories for exploit-development
Users that are interested in exploit-development are comparing it to the libraries listed below
Sorting:
- material for exploit development☆18May 3, 2019Updated 6 years ago
- Brute forcing login pages with SQL Injection queries with cURL☆20Nov 9, 2023Updated 2 years ago
- Hacking the Wifi Spy Tank YD-211S☆12Nov 1, 2019Updated 6 years ago
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 3 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- ☆12Dec 14, 2021Updated 4 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- ☆16Jun 22, 2020Updated 5 years ago
- Angecryption implementation in Python☆17Jun 2, 2019Updated 6 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 5 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆75Feb 7, 2021Updated 5 years ago
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 4 months ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Aug 1, 2022Updated 3 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22May 14, 2017Updated 8 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- ☆49Sep 20, 2019Updated 6 years ago
- ☆23Jul 5, 2020Updated 5 years ago
- ☆30Sep 5, 2025Updated 5 months ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- This repo covers Branch and Jump Tables in C and x86 assembly. Branch Tables handle jumps within a subroutine, while Jump Tables facilita…☆10Jul 18, 2023Updated 2 years ago
- Clipboard access notification inspired by iOS 14☆22Jun 30, 2020Updated 5 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆234Aug 21, 2020Updated 5 years ago
- Package provides a minimal and simple integration to attach OWASP security headers for building a secure Laravel application.☆18Mar 10, 2023Updated 2 years ago
- Blog posts☆29Aug 7, 2020Updated 5 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32May 10, 2018Updated 7 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆78Jan 30, 2020Updated 6 years ago
- Red Team C2 and Post Exploitation code☆35Jul 8, 2025Updated 7 months ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆30Jun 11, 2019Updated 6 years ago
- Random CVEs☆34May 10, 2025Updated 9 months ago