Exploits backed up from http://1337day.com in the 2011
☆20Jan 27, 2021Updated 5 years ago
Alternatives and similar repositories for exploits-backup
Users that are interested in exploits-backup are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- forced-evolution☆31Sep 4, 2013Updated 12 years ago
- Windows inject☆17Jun 7, 2018Updated 7 years ago
- ☆13Feb 17, 2016Updated 10 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Resident (inotify) Anti-Malware Scanner using rules from Linux Malware Detect project☆11Jul 5, 2014Updated 11 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- ☆28Oct 16, 2017Updated 8 years ago
- ☆13Feb 25, 2014Updated 12 years ago
- a mini tool to dump password and NTLM hash from WDigest & MSV1_0 & tspkg, as a result of study of mimikatz☆83Sep 27, 2018Updated 7 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- ZigBee hacking tools and scripts☆14Mar 25, 2018Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- S2-055的环境,基于rest-show-case改造☆37Dec 7, 2017Updated 8 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- RFID spoofing code from scanlime.org☆20Sep 12, 2012Updated 13 years ago
- Honeypot for router backdoor (TCP 32764)☆19Feb 6, 2014Updated 12 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- 安全狗sql注入绕过☆29Mar 21, 2018Updated 8 years ago
- MBR manipulation tool☆18Jan 13, 2014Updated 12 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- ☆16Feb 26, 2018Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- botnet scanner written in python☆14Apr 4, 2018Updated 7 years ago
- Source Code Intelligence☆30Aug 21, 2017Updated 8 years ago
- NodeXP - A Server Side Javascript Injection tool capable of detecting and exploiting Node.js vulnerabilities☆108Jan 31, 2025Updated last year
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Sep 14, 2017Updated 8 years ago
- Virtual host brute forcer☆22Jan 10, 2014Updated 12 years ago
- ☆21Jul 10, 2017Updated 8 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Mar 27, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆18Jul 30, 2018Updated 7 years ago
- Passive DNS collection (and statistics) from RIPE Atlas Sensors☆19Apr 23, 2017Updated 8 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Nov 2, 2013Updated 12 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- 来自Freebuf评论区,一个UEFI马.☆51May 1, 2017Updated 8 years ago
- Collection of tools for web recon and enumeration.☆56Jun 3, 2015Updated 10 years ago