Vulnerabilities exploitation examples, python
☆23May 22, 2023Updated 2 years ago
Alternatives and similar repositories for vulnexipy
Users that are interested in vulnexipy are comparing it to the libraries listed below
Sorting:
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- ☆32Updated this week
- Simple vulnerability labs that created using PHP and MySQL.☆16Dec 30, 2022Updated 3 years ago
- A CLI tool to extract, analyze, and filter JavaScript links from web pages or URLs, with regex matching and structured JSON output.☆19Jan 6, 2025Updated last year
- An Bug Hunters tool to find many Vulnerabilities using Google dorks☆19Nov 18, 2020Updated 5 years ago
- ☆18Mar 13, 2022Updated 3 years ago
- autoreport generates bug report templates for security researchers☆20Aug 4, 2023Updated 2 years ago
- ☆10Apr 13, 2022Updated 3 years ago
- Check Your IP Address☆10Mar 12, 2022Updated 3 years ago
- SPAMer work☆10Oct 18, 2019Updated 6 years ago
- Power of .bashrc and .bash_aliases☆31Nov 6, 2022Updated 3 years ago
- This is a compiled cheatsheet from my experience of OSCP 2023 journey. Won't say it is all-rounded but a good starting point if you wanna…☆14Oct 17, 2024Updated last year
- ☆10Jul 16, 2024Updated last year
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- 🔐 EntroPy Password Generator A powerful Python-based password generator with 20+ modes, producing high-entropy passwords (15–128 chars, …☆20Nov 23, 2025Updated 3 months ago
- This is a Packet flooder python program, This tool is created by 47hxl-53r, This tool is created only for educational purposes, Creator …☆10May 5, 2022Updated 3 years ago
- 🐙 Yusher Web Browsers☆12Nov 2, 2021Updated 4 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- A simple python script to follow stock market papers in your portfolio☆12Jun 29, 2020Updated 5 years ago
- A curated list of awesome AI tools for generating and manipulating 3D models using text, images, or AI-enhanced modeling engines.☆14Apr 19, 2025Updated 10 months ago
- ☆10Apr 18, 2019Updated 6 years ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- ☆21May 19, 2024Updated last year
- A decentralized autonomous organization (DAO) starter kit. This DApp allows users to propose governance actions and vote on them using a …☆22Jan 23, 2026Updated last month
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆45Aug 9, 2023Updated 2 years ago
- Python library for SPF, DKIM, and DMARC email protections.☆42May 28, 2018Updated 7 years ago
- 🎮 Tetris with AI vs AI mode, 8-bit sound, theme shop, replay sharing & more — zero dependencies PWA☆24Feb 15, 2026Updated 3 weeks ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- AI-powered code review assistant for GitHub Pull Requests using OpenAI GPT-4 and Claude with automated feedback and analytics dashboard.☆22Dec 13, 2025Updated 2 months ago
- Modern Ansible Management Interface☆17Sep 8, 2025Updated 6 months ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- Who needs authentication? This cache purge vulnerability finder doesn't!☆10Apr 20, 2023Updated 2 years ago
- A Rails RESTful API designed to support intuitive habit tracking UX, with secure JWT auth, clear data modeling, and seamless integration …☆10Aug 4, 2025Updated 7 months ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- Simple web API in php which takes as a parameter with GET requests to launch attacks with scripts present on the machine. There is also …☆11Mar 27, 2021Updated 4 years ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- ☆10Jan 17, 2022Updated 4 years ago
- Simple Antivirus☆10Dec 24, 2016Updated 9 years ago