The utility for CTF hacker competition for team hacking and flag submitting
☆43Dec 5, 2017Updated 8 years ago
Alternatives and similar repositories for exploit_farm
Users that are interested in exploit_farm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Asynchronous exploit farm for attack-defence CTF☆22Nov 8, 2018Updated 7 years ago
- ☆12Nov 16, 2019Updated 6 years ago
- Exploits for interesting CTF challenges I have worked on☆63Mar 1, 2017Updated 9 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 8 years ago
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- A Tool for Impersonating CAPTCHA Providers☆16Aug 3, 2012Updated 13 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- some demos demonstrate the heap exploitation of ptmalloc2☆12May 25, 2017Updated 8 years ago
- Programs used in the Exploitation Tutorial. Check out thehackerway.com☆20Mar 11, 2014Updated 12 years ago
- A list of universities with vulnerability disclosure policies☆54Jul 13, 2021Updated 4 years ago
- Hacks for the Western Digital My Passport Wireless network attached storage device☆27Dec 14, 2014Updated 11 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆27Mar 1, 2022Updated 4 years ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- Timing attack resistant type systems☆24May 13, 2015Updated 10 years ago
- Simple tool for unpacking packed/protected malware executables.☆32Oct 27, 2011Updated 14 years ago
- Automatically exported from code.google.com/p/ioctlbf☆17Mar 28, 2015Updated 11 years ago
- This is an automatic SQL Injection tool called as FatCat , Use of FatCat for testing your web application and exploit your application m…☆18Oct 22, 2015Updated 10 years ago
- Volatility Plugins☆22May 1, 2015Updated 11 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- zer0m0n driver for cuckoo sandbox☆23Feb 24, 2015Updated 11 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Nov 27, 2016Updated 9 years ago
- The LogParserPlus application, which uses Microsoft's Log Parser.☆12Jul 30, 2017Updated 8 years ago
- Una aplicación del clima del curso de Node☆11Mar 6, 2019Updated 7 years ago
- Troopers Conference Supporting Materials☆12Apr 8, 2015Updated 11 years ago
- Multi-arch Docker images for Idris 2☆13Apr 22, 2026Updated 2 weeks ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Code snippets☆11Dec 2, 2024Updated last year
- Remote kernel exploit for ROSE amateur radio☆24Aug 8, 2011Updated 14 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 0-ring rootkit revealer for Linux☆29Sep 5, 2019Updated 6 years ago
- Linux local root exploit for CVE-2014-0038☆200Apr 18, 2014Updated 12 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- PoC code for CVE-2018-15499 (exploit race condition for BSoD)☆11Aug 23, 2018Updated 7 years ago
- Linux group_info refcounter overflow use afer free☆13May 4, 2014Updated 12 years ago
- poc for cve-2017-10661☆12Aug 11, 2017Updated 8 years ago
- shell script to create an image and perform initial examination on a drive☆15Feb 28, 2020Updated 6 years ago