The largest hacking program with new tools CVE-2023-PoC for the year 2023 It contains all the attack and exploitation tools for testing websites, as well as a graphical interface to facilitate its use for beginners
☆20Feb 5, 2024Updated 2 years ago
Alternatives and similar repositories for hackers_CVE_2023_poc
Users that are interested in hackers_CVE_2023_poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Ble Fingerprint Sniffer based on SDR.☆19May 13, 2020Updated 5 years ago
- A humble list of hardware hacking tools and resources curated by yours truly☆15Feb 28, 2022Updated 4 years ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Jan 10, 2022Updated 4 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆17Aug 20, 2023Updated 2 years ago
- 🚀 The easiest way to automate building and releasing your iOS and Android apps☆12Apr 29, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Android-Image-Modifier is script/tool to make unpacking repacking of system files easier and less tedious. So android modders/tweakers ca…☆13May 26, 2020Updated 5 years ago
- My Reverse Shell Cheat Sheet☆13Mar 2, 2022Updated 4 years ago
- ☆13Jun 22, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- A Burp extension to Fuzz URLs for HTTP parser inconsistencies☆12Jan 9, 2024Updated 2 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- ☆18Apr 27, 2026Updated last week
- اداة لاقفال ترمكس بكلمة مرور☆14Aug 5, 2022Updated 3 years ago
- 🛝 Transforms any RCE into a functional dumb shell. Designed for constrained environments (e.g., firewalls) where traditional reverse she…☆14Apr 29, 2026Updated last week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Escaner de los puertos internos de un host.☆16Mar 3, 2024Updated 2 years ago
- A tracking system for everything me, e.g.: beliefs, passions, must-haves, must-dos, favorite movies, favorite quotes, favorite aphorisms,…☆30May 1, 2022Updated 4 years ago
- A Whatsapp Spamming tool.☆16May 18, 2024Updated last year
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- A python package to analyze files and provide useful metadata☆15Apr 24, 2017Updated 9 years ago
- A folder to serve tools from during PT/Red Team engagements. Contains common executables and scripts for privesc, recon, pivoting and CVE…☆15Mar 15, 2024Updated 2 years ago
- Bash script to show how viruses spread and to demonstrate how ransomware works.☆19Feb 14, 2023Updated 3 years ago
- A repository for personal tracking.☆17May 1, 2022Updated 4 years ago
- ☆11Jun 25, 2016Updated 9 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆12Jul 14, 2023Updated 2 years ago
- 【一些自用小工具/several useful tools】批量剪视频片头/批量图片区域截取/批量删除指定文件☆12Apr 12, 2018Updated 8 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆12Oct 27, 2024Updated last year
- Ini adalah kumpulan webshell atau backdoor yang lengkap☆18Aug 18, 2024Updated last year
- Herramienta automatizada para enviar correos con phising.☆16Jul 29, 2020Updated 5 years ago
- Monitor your processor's and graphics card's temperatures from the system tray. Lightweight and aesthetic.☆23Jan 2, 2026Updated 4 months ago
- Trustzone Exploit that allows running code in secure mode on Surface RT (Tegra 3) with the help of Yahallo (by imbushuo)☆11Mar 30, 2023Updated 3 years ago
- A little JavaFX TimeControl that was inspired by Apple's sleep timer in iOS 10☆14Apr 18, 2017Updated 9 years ago
- ProcessBouncer is a simple but effective tool for blocking malware with a process-based approach. With a little fine-tuning this allows t…☆25Apr 9, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- 热门框架/组件/服务漏洞的描述/利用/修复☆12Apr 13, 2023Updated 3 years ago
- Add your configs for tmux☆18Apr 3, 2022Updated 4 years ago
- Build an SSL capable transparent proxying WiFi Access point with budget commodity hardware and Open Source software.☆15Mar 1, 2013Updated 13 years ago
- Nimlang "Ransomware" Malware For Linux☆22Jan 15, 2021Updated 5 years ago
- A simple python scanner to detect vulnerable hosts in your net☆21May 15, 2017Updated 8 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- ☆15May 2, 2024Updated 2 years ago