☆91Feb 22, 2021Updated 5 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- ☆82Apr 20, 2021Updated 4 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- ☆10Jan 4, 2015Updated 11 years ago
- A lightweight batch scanning framework based on gevent.☆48Jun 22, 2018Updated 7 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Php Codz Hacking☆669Sep 5, 2015Updated 10 years ago
- Will to be a niubility scan-framework☆519Jul 1, 2025Updated 8 months ago
- Usage: python badtunnel.py wpad_server_ip☆62Jun 20, 2016Updated 9 years ago
- CVE-2017-13089☆55Nov 15, 2017Updated 8 years ago
- A backdoor embedded with Twitter Player Card☆12May 1, 2017Updated 8 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Zmap on Web☆94Oct 13, 2016Updated 9 years ago
- a plenty of poc based on python☆290Jun 10, 2017Updated 8 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆44Dec 17, 2023Updated 2 years ago
- 分布式的sqlmapapi☆11Sep 9, 2016Updated 9 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆332Apr 19, 2017Updated 8 years ago
- Flash XSS Scanner☆54Jun 26, 2016Updated 9 years ago
- Patch pyc files with your code. Fairly lame.☆67Nov 10, 2015Updated 10 years ago
- Creates a SOCK proxy server that transmits data over an SSRF vulnerability☆114Aug 8, 2012Updated 13 years ago
- ☆19Mar 20, 2014Updated 11 years ago
- Semantic SSH RSA keys☆25Feb 25, 2014Updated 12 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆11Dec 20, 2015Updated 10 years ago
- PowerShell module for the exploitation and testing☆16Jul 5, 2015Updated 10 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- security advisories☆12Feb 22, 2021Updated 5 years ago
- Study about HQL injection exploitation.☆51May 15, 2016Updated 9 years ago
- S2-046-PoC☆112Mar 21, 2017Updated 8 years ago
- ☆133Nov 6, 2015Updated 10 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago
- Burp Suite extension for JAX-RS☆65Mar 17, 2017Updated 8 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆426Feb 18, 2020Updated 6 years ago
- Java Message Exploitation Tool☆511Jul 6, 2022Updated 3 years ago
- Some kernel exploit i wrote☆77Jan 9, 2015Updated 11 years ago
- a new crawler based on python with more function including Network fingerprint search☆504Aug 14, 2018Updated 7 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Feb 12, 2021Updated 5 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- ☆10Jun 1, 2014Updated 11 years ago