☆91Feb 22, 2021Updated 5 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- security advisories☆12Feb 22, 2021Updated 5 years ago
- ☆82Apr 20, 2021Updated 4 years ago
- A lightweight batch scanning framework based on gevent.☆48Jun 22, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Php Codz Hacking☆670Sep 5, 2015Updated 10 years ago
- CVE-2017-13089☆55Nov 15, 2017Updated 8 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆44Dec 17, 2023Updated 2 years ago
- Usage: python badtunnel.py wpad_server_ip☆62Jun 20, 2016Updated 9 years ago
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 8 years ago
- Will to be a niubility scan-framework☆520Jul 1, 2025Updated 9 months ago
- ☆10Jan 4, 2015Updated 11 years ago
- Zmap on Web☆94Oct 13, 2016Updated 9 years ago
- 模拟一个存在漏洞的JavaScript 运行环境,用来学习浏览器漏洞原理和练习如何编写Shellcode (a JavaScript Execute Envirment which study browser vuln and how to write Shellcode …☆186Jun 25, 2016Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Patch pyc files with your code. Fairly lame.☆67Nov 10, 2015Updated 10 years ago
- Creates a SOCK proxy server that transmits data over an SSRF vulnerability☆114Aug 8, 2012Updated 13 years ago
- a plenty of poc based on python☆289Jun 10, 2017Updated 8 years ago
- PowerShell module for the exploitation and testing☆16Jul 5, 2015Updated 10 years ago
- 用于扫描git,svn泄露☆78Jul 29, 2015Updated 10 years ago
- ☆19Mar 20, 2014Updated 12 years ago
- Study about HQL injection exploitation.☆52May 15, 2016Updated 9 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- specific fuzzers based on AFL and fuzzing results☆41Oct 22, 2016Updated 9 years ago
- Burp Suite extension for JAX-RS☆64Mar 17, 2017Updated 9 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- subdomain、port、folder scanner☆25Apr 20, 2016Updated 9 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆11Dec 20, 2015Updated 10 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆332Apr 19, 2017Updated 8 years ago
- S2-046-PoC☆112Mar 21, 2017Updated 9 years ago
- pgp.ustc.edu.cn deployment☆10Mar 25, 2019Updated 7 years ago
- ☆10Jun 1, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- Java Message Exploitation Tool☆511Jul 6, 2022Updated 3 years ago
- Flash XSS Scanner☆54Jun 26, 2016Updated 9 years ago
- 分布式的sqlmapapi☆11Sep 9, 2016Updated 9 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Jan 22, 2016Updated 10 years ago
- Reverse TCP Port to UDP Forwarding Tools☆160Nov 11, 2016Updated 9 years ago
- Some kernel exploit i wrote☆77Jan 9, 2015Updated 11 years ago