Collection of different exploits
☆184Nov 17, 2020Updated 5 years ago
Alternatives and similar repositories for exploit
Users that are interested in exploit are comparing it to the libraries listed below
Sorting:
- These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)☆16Mar 12, 2017Updated 9 years ago
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,917Sep 7, 2020Updated 5 years ago
- Ease-of-use extension for Web Application penetration testing☆18Jun 20, 2017Updated 8 years ago
- Collection of things made during my OSCP journey☆954Feb 24, 2022Updated 4 years ago
- 👽 Exploits written for research purposes.☆11Nov 15, 2021Updated 4 years ago
- Repository for python exploits☆73Jan 26, 2021Updated 5 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆985Dec 13, 2017Updated 8 years ago
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- ☆510May 27, 2018Updated 7 years ago
- Apache Tomcat auto WAR deployment & pwning penetration testing tool.☆446Mar 31, 2024Updated last year
- Just some exploits :P☆47Jan 18, 2021Updated 5 years ago
- Ptcoresec jeopardy style scoreboard☆23Jul 17, 2012Updated 13 years ago
- OSCP cheet sheet☆201Oct 21, 2020Updated 5 years ago
- This repo contains my custom scripts for Penetration Testing and Red Team Assessments. I will keep on updating this repo as and when I ge…☆356Nov 14, 2018Updated 7 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- ☆22Jun 23, 2016Updated 9 years ago
- Customize Exploit Codes.☆18Dec 1, 2016Updated 9 years ago
- Notes of my OSCP study plan☆466Jun 29, 2022Updated 3 years ago
- Network reconnaissance and vulnerability assessment tools.☆403Jan 9, 2022Updated 4 years ago
- Collection of things made during my OSCP journey☆267Dec 19, 2017Updated 8 years ago
- Post Exploitation Collection☆1,571May 1, 2020Updated 5 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆628Jun 8, 2018Updated 7 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,145Nov 19, 2024Updated last year
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,504Aug 1, 2023Updated 2 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,187Dec 11, 2022Updated 3 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Bash simulator to control a server using PHP system functions.☆100Nov 21, 2020Updated 5 years ago
- ☆122Mar 6, 2018Updated 8 years ago
- ☆40Mar 17, 2018Updated 8 years ago
- Run PowerShell command without invoking powershell.exe☆1,536Mar 23, 2023Updated 2 years ago
- ERPScan Public POC for CVE-2018-2636☆22Feb 1, 2018Updated 8 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- Windows Pentest Scripts☆232Jan 10, 2018Updated 8 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Simple php reverse shell implemented using binary .☆439Nov 17, 2023Updated 2 years ago