☆28Jun 18, 2019Updated 6 years ago
Alternatives and similar repositories for exploit-development
Users that are interested in exploit-development are comparing it to the libraries listed below
Sorting:
- ☆13Nov 22, 2022Updated 3 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- material for exploit development☆18May 3, 2019Updated 6 years ago
- ☆12Dec 14, 2021Updated 4 years ago
- Runpe + DInvoke + Syscall☆16Jun 18, 2021Updated 4 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- A Golang tool to whitelist ASN's based on organization name☆15Mar 7, 2022Updated 4 years ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- ☆12Sep 4, 2022Updated 3 years ago
- Hacking the Wifi Spy Tank YD-211S☆12Nov 1, 2019Updated 6 years ago
- This repo covers Branch and Jump Tables in C and x86 assembly. Branch Tables handle jumps within a subroutine, while Jump Tables facilita…☆10Jul 18, 2023Updated 2 years ago
- Different code-injections techniques under a common tool☆30May 3, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- go to https://github.com/bruh-boys/reddit-automata its more complete than this repository☆10Jul 9, 2021Updated 4 years ago
- ☆16Jun 22, 2020Updated 5 years ago
- Will try to put here slides from now on when I give a talk☆24Oct 11, 2021Updated 4 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- tcurl - uses tetsuo socket library.☆24Dec 27, 2025Updated 2 months ago
- An example of a mis-configured Rails application release under MIT license.☆21Jan 19, 2023Updated 3 years ago
- Automated Penetration Testing Framework☆35Mar 22, 2019Updated 6 years ago
- ☆38Aug 8, 2021Updated 4 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- Subdomain Enumeration Tool☆12Jan 16, 2021Updated 5 years ago
- Working exploit code for CVE-2019-17625☆19Mar 12, 2020Updated 6 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Library for writing external game cheats for Windows, written in C++.☆14Sep 5, 2016Updated 9 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- ☆23Jun 30, 2021Updated 4 years ago
- A side-scrolling beat 'em up game inspired by classic titles like Double Dragon. Players control one or two fighters battling through sta…☆34Sep 20, 2025Updated 6 months ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- cybersecurity conference materials☆15Sep 1, 2019Updated 6 years ago
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 5 months ago
- operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links wi…☆13Oct 23, 2019Updated 6 years ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆17Jul 18, 2025Updated 8 months ago
- Fast, effective, small, testing framework.☆16Apr 26, 2024Updated last year
- The Enterprise-Scale architecture provides prescriptive guidance coupled with Azure best practices, and it follows design principles acro…☆17Nov 6, 2024Updated last year
- A list of freely available resources that can be used as a prerequisite before taking OSCE.☆234Aug 21, 2020Updated 5 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- PowerShell Pass The Hash Utils☆16Dec 9, 2018Updated 7 years ago