☆12Feb 10, 2020Updated 6 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Some of my presentations and published articles in different conferences☆18Sep 27, 2021Updated 4 years ago
- ☆16Dec 15, 2021Updated 4 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- Using Google translate as WebProxy☆13May 22, 2023Updated 2 years ago
- phpldapadmin remote exploit and vulnerable container !☆13Nov 9, 2018Updated 7 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Nov 19, 2020Updated 5 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Mar 5, 2023Updated 3 years ago
- Google Chrome extension☆20Jun 11, 2025Updated 9 months ago
- Dart framework for implementing Web servers☆11Nov 2, 2023Updated 2 years ago
- 生成各种形式混淆但有效的IP地址☆22Aug 12, 2018Updated 7 years ago
- golang program to send RSS feeds per E-Mail☆10Sep 1, 2025Updated 6 months ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- The purpose of this script is to automate the web enumeration process and search for exploits☆115Apr 19, 2022Updated 3 years ago
- A small game using Fleks Entity Component System.☆11Jun 27, 2025Updated 8 months ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆34Aug 28, 2023Updated 2 years ago
- TCP forwarding module that allow you to forward client connections and servers to a remote.☆20Oct 21, 2019Updated 6 years ago
- Collection about PoC for sql injection on Joomla☆33Dec 22, 2020Updated 5 years ago
- TEAM Mentor 3.x Released Code☆16Aug 5, 2016Updated 9 years ago
- A block-based intermediate representation for document-like content.☆40Jan 18, 2026Updated 2 months ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- ☆10Dec 19, 2024Updated last year
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- Open-source, enterprise-grade threat modeling platform☆32Updated this week
- shellcode obfuscater and runner in golang☆11Aug 13, 2023Updated 2 years ago
- Supertruder but better☆31Mar 10, 2023Updated 3 years ago
- ☆10Aug 9, 2024Updated last year
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- Js File Scanner☆11Mar 30, 2021Updated 4 years ago
- ☆58May 10, 2023Updated 2 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- Opai cs2 source (tg channel: anonteam1337)☆11Sep 24, 2024Updated last year
- Calculate the domain age with python script☆11Mar 27, 2018Updated 7 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆31Mar 30, 2020Updated 5 years ago
- a Go code to detect leaks in JS files via regex patterns☆151Oct 20, 2021Updated 4 years ago
- This project provides an AI-driven test case generator using FastAPI. The application accepts a GitHub repository name and generates test…☆19Jun 7, 2024Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- ☆14Dec 3, 2022Updated 3 years ago