SourceCodeBackup / exploits-backupView external linksLinks
Exploits backed up from http://1337day.com in the 2011
☆20Jan 27, 2021Updated 5 years ago
Alternatives and similar repositories for exploits-backup
Users that are interested in exploits-backup are comparing it to the libraries listed below
Sorting:
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- The GA-IDS is a full-fledged host based intrusion detection system developed using the Java programming language to help detect packets h…☆12Feb 27, 2019Updated 6 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- Resident (inotify) Anti-Malware Scanner using rules from Linux Malware Detect project☆11Jul 5, 2014Updated 11 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- botnet scanner written in python☆13Apr 4, 2018Updated 7 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 7 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- ☆13Feb 17, 2016Updated 9 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- Windows inject☆16Jun 7, 2018Updated 7 years ago
- Tornado Demo Vulnerable Application to test SQL injection vulnerability and patch it using RASP (Runtime Application Self-Protection)☆11Nov 15, 2017Updated 8 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- RFID spoofing code from scanlime.org☆20Sep 12, 2012Updated 13 years ago
- Honeypot for router backdoor (TCP 32764)☆19Feb 6, 2014Updated 12 years ago
- ☆16Aug 2, 2018Updated 7 years ago
- NodeXP - A Server Side Javascript Injection tool capable of detecting and exploiting Node.js vulnerabilities☆108Jan 31, 2025Updated last year
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- ☆18Jul 30, 2018Updated 7 years ago
- forced-evolution☆31Sep 4, 2013Updated 12 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- ☆16Feb 26, 2018Updated 7 years ago
- Tool is to check for Cache Deception Attack Both For Authenticated and UnAuthenticated Pages☆44Nov 23, 2021Updated 4 years ago
- ☆13Feb 25, 2014Updated 11 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- Small cyberspace search engine☆41Aug 28, 2020Updated 5 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 8 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Mar 1, 2019Updated 6 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 6 years ago
- ☆21Jul 10, 2017Updated 8 years ago