Simple python3 script to automate CVE-2018-9995
☆11Feb 20, 2024Updated 2 years ago
Alternatives and similar repositories for DVR_Sploit
Users that are interested in DVR_Sploit are comparing it to the libraries listed below
Sorting:
- ☆14Apr 6, 2025Updated 11 months ago
- Read PostgreSQL data files without credentials - forensics, data recovery, and security research tool☆43Jan 18, 2026Updated 2 months ago
- Webanator: Webcam scraper written in python that will scrape any countries web cameras.☆23Jan 10, 2026Updated 2 months ago
- PoC for Exploiting CVE-2024-31848/49/50/51 - File Path Traversal☆18May 7, 2024Updated last year
- 🛠️ Android Debug Bridge (ADB) Utility ⚙️☆15Mar 5, 2023Updated 3 years ago
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- ☆14Mar 8, 2026Updated last week
- Flash your ESP32 quickly and easily.☆36Mar 4, 2026Updated 2 weeks ago
- Shell script to set up Kali VMs for CTFs - installs tools and adds aliases to Bash and Zsh profiles.☆16Dec 30, 2025Updated 2 months ago
- MavLink Protocol Drone Exploiting Tool☆15Aug 24, 2024Updated last year
- Jailbreak iOS 18 and Cydia Download Customize your iPhone in more ways than ever!☆18Jun 16, 2024Updated last year
- WebSocket and SQL Injection Exploit Script☆40Feb 27, 2025Updated last year
- Ardusim. Accurate and real-time multi-UAV simulation☆15Nov 28, 2022Updated 3 years ago
- A small python script that uses msfvenom to hide a tcp reverse shell to an android device inside an APK file☆14Jul 18, 2020Updated 5 years ago
- CoT KML route simulator☆16Aug 27, 2025Updated 6 months ago
- SSL/TLS Certificate Checker - A Python script to validate SSL/TLS certificates for common misconfigurations and output the results in JSO…☆17Sep 27, 2023Updated 2 years ago
- PAN-OS auth bypass + RCE☆47Nov 19, 2024Updated last year
- Pi-Gen - Trixie for the DevTerm/uConsole☆23Feb 17, 2026Updated last month
- 2020 was a roller coaster of major, world-shaking events. We all couldn't wait for the year to end. But just as 2020 was about to close, …☆20Mar 26, 2022Updated 3 years ago
- A fast WordPress plugin enumeration tool☆796Updated this week
- Unauthenticated RCE on CraftCMS when PHP `register_argc_argv` config setting is enabled☆48Dec 23, 2024Updated last year
- WiFi Cha0s t00lkit☆80Mar 4, 2026Updated 2 weeks ago
- Don't get slowed down by iOS 7, 8 and 9 Animations☆27Feb 8, 2016Updated 10 years ago
- Python Scanner and Exploiter of Remote File Inclusion Vulnerabilitie☆13Jan 6, 2022Updated 4 years ago
- World's fastest and most advanced password recovery utility☆19Feb 16, 2025Updated last year
- This repository contains information on the CVEs I found.☆52Mar 10, 2024Updated 2 years ago
- to find shell backdoor in website☆17Jun 3, 2023Updated 2 years ago
- command-line CoT/TAK TCP server☆15Mar 6, 2022Updated 4 years ago
- ☆21Jun 1, 2018Updated 7 years ago
- Documentation for Blueprint build with Jigsaw☆11Dec 9, 2025Updated 3 months ago
- Bug Bounty ultimate tool☆28Dec 3, 2025Updated 3 months ago
- A centralized Python botnet that currently supports HTTP, TCP and UDP flood attacks.☆15Jul 6, 2025Updated 8 months ago
- Script for Reconnaissance(Bug Bounty)☆18May 15, 2022Updated 3 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- CISOfy Handbook☆35Sep 15, 2016Updated 9 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- A simple Mac-Address Sniffer based on tshark☆12Dec 27, 2018Updated 7 years ago
- how hackers Hackers can exploit SS7 vulnerabilities to intercept phone calls, SMS messages, and even track the real-time location of a ph…☆32Jan 11, 2025Updated last year
- java library for game hacking and an example on "Cube2 Sauerbraten"☆18Sep 11, 2019Updated 6 years ago