cocomelonc / vulnexipyView external linksLinks
Vulnerabilities exploitation examples, python
☆23May 22, 2023Updated 2 years ago
Alternatives and similar repositories for vulnexipy
Users that are interested in vulnexipy are comparing it to the libraries listed below
Sorting:
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆12May 31, 2024Updated last year
- ☆15Feb 5, 2025Updated last year
- Simple vulnerability labs that created using PHP and MySQL.☆16Dec 30, 2022Updated 3 years ago
- OFFZONE 2024 Malware Persistence workshop☆22Dec 18, 2024Updated last year
- A CLI tool to extract, analyze, and filter JavaScript links from web pages or URLs, with regex matching and structured JSON output.☆19Jan 6, 2025Updated last year
- An Bug Hunters tool to find many Vulnerabilities using Google dorks☆19Nov 18, 2020Updated 5 years ago
- ☆18Mar 13, 2022Updated 3 years ago
- autoreport generates bug report templates for security researchers☆20Aug 4, 2023Updated 2 years ago
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated last year
- ☆10Apr 13, 2022Updated 3 years ago
- SPAMer work☆10Oct 18, 2019Updated 6 years ago
- Check Your IP Address☆10Mar 12, 2022Updated 3 years ago
- GUI SQL Injection scannig tool☆31Oct 24, 2025Updated 3 months ago
- ☆11Jun 10, 2025Updated 8 months ago
- A decentralized autonomous organization (DAO) starter kit. This DApp allows users to propose governance actions and vote on them using a …☆21Jan 23, 2026Updated 3 weeks ago
- ☆10Jul 16, 2024Updated last year
- This is a compiled cheatsheet from my experience of OSCP 2023 journey. Won't say it is all-rounded but a good starting point if you wanna…☆14Oct 17, 2024Updated last year
- pypykatz plugin for volatility3 framework☆46May 30, 2025Updated 8 months ago
- A Powerful XSS,RXSS,BXSS finding tool☆30Oct 29, 2025Updated 3 months ago
- 🔐 EntroPy Password Generator A powerful Python-based password generator with 20+ modes, producing high-entropy passwords (15–128 chars, …☆19Nov 23, 2025Updated 2 months ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- A curated list of awesome AI tools for generating and manipulating 3D models using text, images, or AI-enhanced modeling engines.☆13Apr 19, 2025Updated 9 months ago
- 🐙 Yusher Web Browsers☆12Nov 2, 2021Updated 4 years ago
- A semantic analysis tool for debugging python code☆24Jan 12, 2026Updated last month
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- ☆21May 19, 2024Updated last year
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- This is a Packet flooder python program, This tool is created by 47hxl-53r, This tool is created only for educational purposes, Creator …☆10May 5, 2022Updated 3 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Aug 9, 2023Updated 2 years ago
- Code of Decomposition and Completion Network for Salient Object Detection, TIP 2021.☆10Mar 30, 2023Updated 2 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 2 months ago
- logic programming in elixir☆10Nov 1, 2018Updated 7 years ago
- A Python Script to find admin panel of a site☆10Apr 10, 2022Updated 3 years ago
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- Makeup store iOS app developed in Swift☆11Apr 28, 2023Updated 2 years ago