Exploits project Hacking Command Center
☆52Sep 22, 2023Updated 2 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- Mining on restricted environments made easy! Hidden GUI Ethereum miner that mines to NiceHash wallet or Normal Ethereum wallet.…☆13Oct 24, 2020Updated 5 years ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- Bruteforce tool for Pentester's lucky day targeting SSH-services.☆12Nov 27, 2020Updated 5 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Lightweight and extensible horizontal vulnerability scanner☆11Dec 8, 2022Updated 3 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- javaweb的流量监控脚本,基于filter,也有jar版本,那天曹佬说它就取名叫拉普拉斯的流量女仆(java_Laplace_Fluid_Maid)好了☆12Aug 8, 2023Updated 2 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 9 months ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- ☆21Dec 15, 2020Updated 5 years ago
- check if the source code compressed and uploaded to the server by mistake☆10Feb 21, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 13 years ago
- Comprehensive MCP server for bug bounty hunting and web application penetration testing☆29Sep 13, 2025Updated 7 months ago
- Sauvegarde de mon environnement de travail de l'université qui me permet d’accéder à tous mes projets de programmation.☆11Sep 4, 2021Updated 4 years ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- Python3 Scripts for OSCP buffer overflow exploitation☆12May 12, 2021Updated 4 years ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 4 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆16Sep 10, 2023Updated 2 years ago
- Script Python qui permet de savoir si le recaptcha v3 d'un site est bypassable et si bypassable il génère un txt avec du loliscript idéal…☆13Sep 20, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473☆163Aug 16, 2021Updated 4 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Oct 20, 2022Updated 3 years ago
- ☆12Apr 26, 2022Updated 3 years ago
- Tool for collect subdomains from different websites but the unique in tool collect subdomains from subdomainfinder.c99 and collect all su…☆26Feb 5, 2023Updated 3 years ago
- Election results data reported for Pakistan 2018 general elections☆11Sep 5, 2018Updated 7 years ago
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Nov 19, 2024Updated last year
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- Get acquisitions by scraping titles of crunchbase.☆15Dec 18, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- cli to open emulator without open android studio☆27Jan 31, 2023Updated 3 years ago
- FOSS Patcher in Batchfile for Windows Users to bypass Windows 11 Restrictions - Unfinished☆15Oct 8, 2023Updated 2 years ago
- My attempt at writing an Operating System from scratch☆13Mar 3, 2023Updated 3 years ago
- Dump of the crypto-miner that got installed on my system☆14May 30, 2020Updated 5 years ago
- Reinforcement learning crypto trading bot☆10Oct 30, 2020Updated 5 years ago
- use shellcode as asm function☆23Mar 29, 2022Updated 4 years ago
- make virus without coding☆12Apr 7, 2020Updated 6 years ago