Some exploits and exploit development stuff.
☆153Feb 19, 2022Updated 4 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 13 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Python toolkit for injecting DLL files into running processes on Windows☆253Mar 19, 2017Updated 9 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Exploits and research stuffs☆54Jan 19, 2026Updated 2 months ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37May 20, 2013Updated 12 years ago
- python based backdoor software☆17Oct 14, 2011Updated 14 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- TinySHell port to SCTP☆131Oct 19, 2013Updated 12 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆891May 16, 2020Updated 5 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Dec 5, 2014Updated 11 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Unofficial Kali Documentation Project☆160Feb 27, 2015Updated 11 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- 分布式的sqlmapapi☆11Sep 9, 2016Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Python PTY backdoors - full PTY or nothing!☆754Jul 28, 2014Updated 11 years ago
- Arya is a simple obfuscator for .NET binaries.☆37Dec 11, 2017Updated 8 years ago
- Miscellaneous exploit code☆1,570Oct 6, 2023Updated 2 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- ☆15Jul 11, 2019Updated 6 years ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- ☆133Nov 6, 2015Updated 10 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆526Apr 13, 2017Updated 8 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆807Mar 7, 2024Updated 2 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- ☆17Nov 25, 2015Updated 10 years ago
- Exploit repository☆202Jul 6, 2015Updated 10 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆353Jan 12, 2023Updated 3 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆42Oct 28, 2015Updated 10 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆252Sep 27, 2023Updated 2 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago