Exploits project Hacking Command Center
☆52Sep 22, 2023Updated 2 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- parse ffuf & map endpoints to wordlists☆21Feb 25, 2021Updated 5 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- Plunge into the depths of the web with Linkscraper! Uncover links, images, emails, and more swiftly, catering to researchers, developers,…☆11Nov 9, 2024Updated last year
- Locate device location using Social engineering☆18Sep 30, 2022Updated 3 years ago
- Bruteforce tool for Pentester's lucky day targeting SSH-services.☆12Nov 27, 2020Updated 5 years ago
- Python application to scan user's installed browsers for secrets such as stored passwords and cookies.☆14Jun 16, 2021Updated 4 years ago
- Materials for CVE-2024-30052.☆12Oct 4, 2024Updated last year
- Lightweight and extensible horizontal vulnerability scanner☆11Dec 8, 2022Updated 3 years ago
- tool for sniffing images over HTTP traffic and showing them on the console. Designed for remote shells.☆12Jul 30, 2020Updated 5 years ago
- Hacker Community Remote Access Trojan☆27Mar 3, 2022Updated 4 years ago
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 3 years ago
- Finds Domain Controller on a network, enumerates users, AS-REP Roasting and hash cracking, bruteforces password, dumps AD users, DRSUAPI,…☆18Sep 23, 2023Updated 2 years ago
- Mining on restricted environments made easy! Hidden GUI Ethereum miner that mines to NiceHash wallet or Normal Ethereum wallet.…☆13Oct 24, 2020Updated 5 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 7 months ago
- Really useful hacking tools.☆19Dec 16, 2023Updated 2 years ago
- 看起来叫BabyBypass,实际啥都会记一些☆16Sep 10, 2023Updated 2 years ago
- hack tik tok☆20May 19, 2021Updated 4 years ago
- ☆21Dec 15, 2020Updated 5 years ago
- Collection of content discovery wordlists in one wordlist.☆38Jan 18, 2022Updated 4 years ago
- Shell and Pen-testing Tool☆17May 14, 2025Updated 9 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- Bypass http 403 🐏☆16Feb 26, 2022Updated 4 years ago
- Collection of auxiliary command line tools☆83Sep 23, 2023Updated 2 years ago
- Make a bad usb out of any USB drive☆21Nov 9, 2018Updated 7 years ago
- An ADB-based botnet written in C.☆48May 3, 2022Updated 3 years ago
- layer7 mirai private layer4 ovh bypass nfo bypass☆46Aug 11, 2022Updated 3 years ago
- FOSS Patcher in Batchfile for Windows Users to bypass Windows 11 Restrictions - Unfinished☆15Oct 8, 2023Updated 2 years ago
- PoC-Malware-TTPs☆48Mar 26, 2023Updated 2 years ago
- use shellcode as asm function☆23Mar 29, 2022Updated 3 years ago
- Zimbra CVE-2022-37042 Nuclei weaponized template☆20Aug 29, 2022Updated 3 years ago
- ☆21Feb 12, 2026Updated 3 weeks ago
- ☆13May 24, 2023Updated 2 years ago
- CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) RCE POC☆20Nov 19, 2024Updated last year
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago