Vulnerability teaching showcase
☆13Apr 19, 2016Updated 9 years ago
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Stagefright Android exploit☆18Aug 11, 2022Updated 3 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- ☆44Sep 25, 2025Updated 5 months ago
- Bash PoC for Fortinet Auth Bypass - CVE-2022-40684☆16Apr 2, 2023Updated 2 years ago
- Malware Analysis (Zararlı Yazılım Analizi)☆33Aug 1, 2019Updated 6 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Powershell Keepass Brute Force Tool☆28Jul 22, 2019Updated 6 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Scripts that automate portions of pentests.☆58Mar 4, 2026Updated 2 weeks ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- Some metasploit scripts to help to control busybox based embedded devices☆31Aug 13, 2015Updated 10 years ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- A Wordpress Exploitation Toolkit☆15Nov 22, 2017Updated 8 years ago
- ☆11May 8, 2019Updated 6 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- Collection of scripts and documentations of retired machines in the hackthebox.eu platform☆41Feb 7, 2020Updated 6 years ago
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆37Aug 13, 2025Updated 7 months ago
- Fortran Based Nueral Networks☆13Aug 29, 2016Updated 9 years ago
- A TypeScript based polymer components, with extended functionality.☆10Jul 23, 2024Updated last year
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- Nmap results are a semigroup☆13Jul 8, 2021Updated 4 years ago
- A small and compact closure-compiler compatible javascript library for managing shaders.☆31Aug 5, 2019Updated 6 years ago
- General Use Timeseries Containers for Rust☆11Dec 31, 2020Updated 5 years ago
- ☆15Jul 22, 2022Updated 3 years ago
- USB Attack to Decrypt Wi-Fi Communications☆32Aug 11, 2015Updated 10 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆30Nov 8, 2012Updated 13 years ago
- Technical Information for the Lacona Kickstarter☆11Jul 28, 2015Updated 10 years ago
- PHP Vulnerability Hunter (fork)☆13May 8, 2015Updated 10 years ago
- Utility for stripping image metadata☆10Nov 9, 2020Updated 5 years ago
- Asynchronous MSF RPC API wrapper☆21Dec 8, 2022Updated 3 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- ChipWhisperer - the complete open-source toolchain for side-channel power analysis and glitching attacks☆18Mar 18, 2019Updated 7 years ago
- Treck Network Stack Discovery Tool [Ripple20]☆12Jul 1, 2020Updated 5 years ago
- Easy installers for Maru OS.☆12May 19, 2019Updated 6 years ago
- Bottlenose Source Code☆11May 25, 2017Updated 8 years ago