St0rn / Exploit
St0rn's exploits development (Web, Applicative, Network)
☆7Updated 9 years ago
Alternatives and similar repositories for Exploit:
Users that are interested in Exploit are comparing it to the libraries listed below
- Microsoft Office / COM Object DLL Planting☆15Updated 8 years ago
- --= Xt9 - Anti - Rootkit =-- beta v0.11 by xti9er☆15Updated 4 years ago
- Proof of concept demo for a tool that listens for keywords, and records audio to a file.☆12Updated 7 years ago
- Shellcode tracer☆15Updated 8 years ago
- Juniper backdoor☆13Updated 9 years ago
- Win32 Shellcodes☆9Updated 7 years ago
- Web Application Firewall For Limited Exploitation☆17Updated 7 years ago
- ☆19Updated 10 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 9 years ago
- ☆9Updated 9 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- This is the linux version of the R.A.T client written in c#☆10Updated 7 years ago
- 一个攻击框架☆10Updated 9 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆12Updated 10 years ago
- SNMP Backdoor Communication Channel☆15Updated 13 years ago
- ☆22Updated 7 years ago
- "HeaderScan" Burp Plugin☆17Updated 10 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆10Updated 8 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- FUD Metasploit Android Payload☆10Updated 9 years ago
- simple rootkit for computer security class☆14Updated 12 years ago
- Converts burp's sitemap to sulley's fuzzing script☆12Updated 9 years ago
- Exploiting Edge's read:// urlhandler☆15Updated 3 years ago
- Some Of Huawei Routers Exploits☆13Updated 8 years ago
- cross site scripting framework plugin for metasploit☆17Updated 12 years ago
- HitCon 2014 : IE 11 0day & Windows 8.1 Exploit☆25Updated 10 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Updated 12 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Updated 12 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- ☆13Updated 2 years ago