All Exploit List Made By Me
☆17Apr 7, 2025Updated 11 months ago
Alternatives and similar repositories for Exploit
Users that are interested in Exploit are comparing it to the libraries listed below
Sorting:
- Testing POC for use cases☆25Nov 24, 2024Updated last year
- 🧩 2048 Web Game – A modern and responsive web-based version of the classic 2048 puzzle. Built with HTML, CSS, and JavaScript, featuring …☆21Feb 7, 2026Updated last month
- This is a readme for my profile☆15Updated this week
- ☆23Apr 6, 2025Updated 11 months ago
- 🔧Automated GitHub unfollow script to manage your following list!☆10Apr 3, 2025Updated 11 months ago
- Calculator☆13May 19, 2025Updated 10 months ago
- Proof of Concept for CVE-2025-31161 / CVE-2025-2825☆49Apr 8, 2025Updated 11 months ago
- Attack/Defense services for the CyberChallenge.IT 2024 National Competition @ Turin, Italy☆11Jul 18, 2024Updated last year
- A domain recon tool to help detect DNS based vulnerabilities, such as zone transfers and subdomain takeovers.☆11Mar 25, 2022Updated 3 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago
- POC for netdata ndsudo vulnerability - CVE-2024-32019☆21Aug 3, 2025Updated 7 months ago
- ☆12Feb 16, 2025Updated last year
- Ansible playbook managment with GUI based on flask☆15Sep 3, 2025Updated 6 months ago
- A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record eac…☆18Jul 29, 2024Updated last year
- Shodan-Grabber is a Node.js tool for scraping IP addresses and other information from Shodan's web interface. It utilizes Puppeteer for w…☆17Nov 13, 2024Updated last year
- LiteSpeed Cache Privilege Escalation PoC☆21Aug 25, 2024Updated last year
- 🔐 EntroPy Password Generator A powerful Python-based password generator with 20+ modes, producing high-entropy passwords (15–128 chars, …☆20Nov 23, 2025Updated 3 months ago
- Wordpress Login Checker☆24Oct 2, 2024Updated last year
- Pwny Cup 2K24 quals challenges writeups☆14Nov 9, 2024Updated last year
- In this project, I use OpenAI and the DALL-E model to create a web app that generates images from scratch based on the entered text.☆10Dec 12, 2022Updated 3 years ago
- Action-Driven Asset Orchestrator Suite with Distributed architecture featuring Dynamic Content Management capabilities implementing moder…☆16Oct 1, 2025Updated 5 months ago
- Git Source Code Mirror☆16Apr 25, 2025Updated 10 months ago
- CRUD con archivos en PHP y MySQL☆11Aug 22, 2023Updated 2 years ago
- ►☆17May 19, 2011Updated 14 years ago
- ☆10Jan 4, 2025Updated last year
- Awesome DNS Security is a curated list of tools, best practices, and resources focused on securing DNS infrastructure.☆22Oct 11, 2024Updated last year
- Implemetation Denial of services attack with python (socket programming and threading)☆16Jun 1, 2020Updated 5 years ago
- My short portfolio 💖☆12Dec 6, 2025Updated 3 months ago
- Java Gui Login and Sign Up☆15Apr 13, 2023Updated 2 years ago
- ☆17Oct 8, 2024Updated last year
- ☆13May 6, 2024Updated last year
- A Python-based simulation of a secure, anonymous, and verifiable voting system built on blockchain principles using commutative encryptio…☆24Sep 15, 2025Updated 6 months ago
- a simple keylogger in python that sends the keystrokes to the server (Telegram)☆23Aug 18, 2025Updated 7 months ago
- ☆10Jan 9, 2024Updated 2 years ago
- 🔥LeetCode solutions in any programming language | 多种编程语言实现 LeetCode、《剑指 Offer(第 2 版)》、《程序员面试金典(第 6 版)》题解☆20Mar 12, 2026Updated last week
- Repositório Ruby On Rails de uma aplicação de delivery com autenticação, threads, docker, testes. Back-end e interface :admin e developer…☆10Oct 6, 2024Updated last year
- This is a simple Journal Application i wrote in C# on .NET MAUI framework. I was inspired by the iOS Journal app, still a work in progres…☆14Jul 25, 2024Updated last year
- This Is The Ultimate Bug Bounty Automation & Web Hacking Tool That I've Created.☆28Feb 27, 2023Updated 3 years ago
- Python ejemplos de software, codigos basicos, uso de librerias y codigos relacionados a la Ciberseguridad. Codigo python, Python codes, …☆19Mar 8, 2026Updated last week