Repository for python exploits
☆73Jan 26, 2021Updated 5 years ago
Alternatives and similar repositories for python-exploits
Users that are interested in python-exploits are comparing it to the libraries listed below
Sorting:
- Collection of different exploits☆184Nov 17, 2020Updated 5 years ago
- This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP …☆11Nov 3, 2020Updated 5 years ago
- Linux pentest tools☆89Nov 4, 2019Updated 6 years ago
- CVE-2017-4878 Samples - http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html☆18Feb 5, 2018Updated 8 years ago
- ☆10Oct 9, 2024Updated last year
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Mar 22, 2017Updated 8 years ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- Experiments on C/C++ Exploits☆22Jun 30, 2020Updated 5 years ago
- ERPScan Public POC for CVE-2018-2636☆22Feb 1, 2018Updated 8 years ago
- This is a basic bind shell script , containting both server and client classes, i will upgrade it with time adding new features and make …☆13Jun 11, 2025Updated 8 months ago
- ☆11Jan 16, 2018Updated 8 years ago
- My attempts at making life with VMware that little bit easier.☆11Aug 7, 2023Updated 2 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- Just some exploits :P☆47Jan 18, 2021Updated 5 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated last month
- ☆16May 9, 2016Updated 9 years ago
- ☆11Mar 12, 2021Updated 4 years ago
- Android FakeID Exploit☆21Aug 7, 2014Updated 11 years ago
- Tool to retrieve Config from Redline C2 servers☆16Mar 14, 2023Updated 2 years ago
- Malware management program and tools☆27Dec 16, 2015Updated 10 years ago
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated last year
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Exploits Oracle 9i XDB ftp password buffer overflow vulnerability☆11Jun 27, 2015Updated 10 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆25Jul 7, 2017Updated 8 years ago
- Random stuff for FlareOn☆14Oct 6, 2018Updated 7 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- ☆14Feb 7, 2018Updated 8 years ago
- offsec batteries included☆1,599Mar 11, 2024Updated last year
- Deobfuscated + reverse engineered javascript malware☆30Jul 20, 2018Updated 7 years ago
- ☆12Nov 9, 2017Updated 8 years ago
- Configurable, Community driven, HTTP C2 Profile☆27Feb 16, 2026Updated last week
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- Moovbox Mismanagement Utilities☆15Mar 21, 2015Updated 10 years ago
- This repo is all about myself coded exploit codes :)☆55Aug 27, 2019Updated 6 years ago
- VBA Obfuscator which I used for obfuscating vba codes to embed into Microsoft Word document while I'm doing some signature bypass testing…☆32Feb 26, 2020Updated 6 years ago
- Identifies Bluetooth Low-energy devices☆16Jul 26, 2020Updated 5 years ago