Repo for all my exploits/PoCs
☆52May 6, 2025Updated last year
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Jul 21, 2024Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- ☆16Apr 17, 2025Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- Will attempt to retrieve DB details for FastAdmin instances☆69Aug 20, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆136Dec 22, 2024Updated last year
- ☆32Jun 1, 2024Updated last year
- GitHub CVE Repository Hunt☆17Jul 23, 2024Updated last year
- PoCs of RCEs against open source C2 servers☆92Sep 28, 2024Updated last year
- Looks for parameters in urls☆34Oct 14, 2024Updated last year
- A tool for searching common variations of a human name☆51Dec 13, 2025Updated 5 months ago
- ☆15Jul 30, 2024Updated last year
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 3 months ago
- فایل ها و فیلم های ورکشاپ ردتیم 2024 با هانت لرن☆34Sep 15, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- A cheatsheet of tools and commands that I use to pentest Active Directory.☆53Mar 26, 2022Updated 4 years ago
- Atlassian Companion RCE Vulnerability Proof of Concept☆25Dec 15, 2023Updated 2 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 11 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 6 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Aug 19, 2024Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Jan 13, 2025Updated last year
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆164Feb 22, 2024Updated 2 years ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆155Jun 10, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- EDR & Antivirus Bypass to Gain Shell Access☆247Sep 30, 2024Updated last year
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆18Jun 3, 2024Updated last year
- Exploit for the vulnerability CVE-2024-43044 in Jenkins☆188Oct 2, 2024Updated last year
- CVE-2024-30090 - LPE PoC☆108Oct 17, 2024Updated last year
- pdf exploit 集成☆248Jul 19, 2024Updated last year
- ZenScraper is an asynchronous scraper built with Python and Playwright designed for efficiently retrieving tweets from X.com (formerly Tw…☆17May 9, 2025Updated last year
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆76Sep 11, 2024Updated last year
- Abusing Azure services over C2☆372Jan 20, 2026Updated 4 months ago
- BlackHat Asia 2025 code and presentations☆17Apr 13, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A simple application that shows how to exploit the CVE-2022-42889 vulnerability☆11Nov 6, 2022Updated 3 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆245Jul 31, 2024Updated last year
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆26Jul 13, 2024Updated last year
- Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)☆152Aug 26, 2024Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Sep 7, 2024Updated last year
- AIS3 2020 pre-exam writeup☆10Jun 30, 2020Updated 5 years ago