☆28Jun 18, 2019Updated 6 years ago
Alternatives and similar repositories for exploit-development
Users that are interested in exploit-development are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Brute forcing login pages with SQL Injection queries with cURL☆20Nov 9, 2023Updated 2 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 6 years ago
- material for exploit development☆18May 3, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆20Aug 18, 2020Updated 5 years ago
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 4 years ago
- ☆12Sep 4, 2022Updated 3 years ago
- Hacking the Wifi Spy Tank YD-211S☆12Nov 1, 2019Updated 6 years ago
- ☆11Sep 17, 2019Updated 6 years ago
- Different code-injections techniques under a common tool☆30May 3, 2020Updated 6 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆76Feb 7, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆49Sep 20, 2019Updated 6 years ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Automated Penetration Testing Framework☆35Mar 22, 2019Updated 7 years ago
- Subdomain Enumeration Tool☆12Jan 16, 2021Updated 5 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 6 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated 2 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- cybersecurity conference materials☆15Sep 1, 2019Updated 6 years ago
- Deployment code for ashirt-server☆20Updated this week
- VIRL scenarios☆10Oct 22, 2017Updated 8 years ago
- ☆30Sep 5, 2025Updated 8 months ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Oct 23, 2019Updated 6 years ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆18Jul 18, 2025Updated 10 months ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Nov 25, 2016Updated 9 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Fast, effective, small, testing framework.☆16Apr 26, 2024Updated 2 years ago
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆237Aug 21, 2020Updated 5 years ago
- PowerShell Pass The Hash Utils☆16Dec 9, 2018Updated 7 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- 🚀 Builder of Malware Loader☆12Nov 12, 2020Updated 5 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- ☆20Jan 12, 2022Updated 4 years ago