Vulnerability teaching showcase
☆13Apr 19, 2016Updated 9 years ago
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago
- Stagefright Android exploit☆18Aug 11, 2022Updated 3 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆30Aug 13, 2015Updated 10 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Nov 8, 2012Updated 13 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆32Aug 1, 2019Updated 6 years ago
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated last month
- utilities☆15Jul 2, 2013Updated 12 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- HitCon 2015 spartan 0day & exploit☆27Sep 1, 2015Updated 10 years ago
- ☆44Sep 25, 2025Updated 5 months ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- ☆12Feb 16, 2012Updated 14 years ago
- To host ProcessMaker v3 Community Editions☆10Jun 18, 2024Updated last year
- General Use Timeseries Containers for Rust☆11Dec 31, 2020Updated 5 years ago
- Configurar EdgeRouter para ver Movistar TV☆12Jul 28, 2020Updated 5 years ago
- ☆21Jul 25, 2017Updated 8 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- MipScope is a cross-platform IDE for students learning assembly on the MIPS architecture. The focus is on a convenient debugging environm…☆17May 11, 2024Updated last year
- ☆10Oct 8, 2015Updated 10 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- SHURIKEN: Exploit throwing framework☆36Dec 8, 2015Updated 10 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Aug 11, 2015Updated 10 years ago
- Search exploits in multiple exploit databases!☆85Oct 1, 2020Updated 5 years ago
- Collection of different ways to execute code outside of the expected entry points☆16Aug 4, 2013Updated 12 years ago
- Research tools for understanding the insides of HBOOT☆19May 13, 2013Updated 12 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- Miscellaneous IDA scripts and projects☆15Apr 14, 2021Updated 4 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- A book about how to conduct digital forensic investigations with free and open source tools.☆11Apr 30, 2014Updated 11 years ago
- A tool to leverage Virus Total's API key with advanced queries to download malware(s) and report(s).☆11Apr 24, 2013Updated 12 years ago
- LuaJIT iOS Framework script - old don't use this☆28Sep 5, 2013Updated 12 years ago
- ☆10Jan 22, 2016Updated 10 years ago