☆26Mar 26, 2018Updated 8 years ago
Alternatives and similar repositories for Security_Exploit
Users that are interested in Security_Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Emulation of UNIX V6 on PDP-11 with teletype☆29Oct 4, 2023Updated 2 years ago
- Wordpress Vulnerability - XSS ( Cross-Site Scripting )☆16Sep 5, 2022Updated 3 years ago
- 🔋 In-place lightweight XML parser☆15May 8, 2024Updated last year
- ☆23Nov 18, 2021Updated 4 years ago
- The long shadow to emerge as other Git repositories☆18Feb 25, 2026Updated last month
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- a shell written in C☆13Mar 15, 2021Updated 5 years ago
- NAT Pinning test suite tool for penetration testers.☆31Feb 17, 2014Updated 12 years ago
- Vulnerable ASP based Web Application☆18Jan 25, 2019Updated 7 years ago
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- Bypass Constrained Language Mode in PowerShell☆29May 21, 2019Updated 6 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Documentation and proofs of concept on the polyglot file PEDICOM (PE executable + DICOM)☆38Apr 10, 2019Updated 6 years ago
- Buffer Overflows☆28Jan 30, 2021Updated 5 years ago
- Writeup for the challenges in H@cktivityCon CTF 2020☆17Aug 6, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A collection of hacks and one-off scripts☆18Jun 4, 2021Updated 4 years ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆21Apr 30, 2024Updated last year
- Writeups/exploit code for CTFs I've done☆13Aug 29, 2021Updated 4 years ago
- only 5 characters to rce☆15Aug 17, 2022Updated 3 years ago
- Projects from Sophomore to Senior year at AU | Resume: http://resume.github.io/?nairuzabulhul☆30Oct 29, 2017Updated 8 years ago
- Collection of CTF Writeups☆12Dec 8, 2022Updated 3 years ago
- 强网杯2021 线上赛 HarderXSS 赛题及WP☆13Jun 17, 2021Updated 4 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- Ghidra is a software reverse engineering (SRE) framework☆11Jan 2, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Virtual host wordlist☆52Jan 12, 2021Updated 5 years ago
- Embed and obfuscate data in Portable Network Graphics☆14Feb 8, 2026Updated 2 months ago
- Malaysia Elite Hacker Team☆11Jan 29, 2025Updated last year
- Command Line Implementation for Node Cron Under 20 Lines.☆10Jul 16, 2021Updated 4 years ago
- Webcam phishing and IP logger connect with Discord webhook.☆13Nov 13, 2021Updated 4 years ago
- Hackthebox tools☆13Mar 3, 2019Updated 7 years ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Oct 22, 2019Updated 6 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- React UI☆11Jan 4, 2023Updated 3 years ago
- Prototype for an in memory fuzzer☆13Aug 1, 2017Updated 8 years ago
- This repository contains resources to learn blockchain technologies and blockchain hacking.☆16Apr 28, 2022Updated 3 years ago
- Vulnerable Task Manager☆22Jan 14, 2025Updated last year
- ☆12Oct 14, 2020Updated 5 years ago
- Zeromutarts Capture the Flag 2013 challenge writeups☆22Dec 9, 2013Updated 12 years ago
- ☆18Jun 28, 2020Updated 5 years ago