Some exploits and exploit development stuff.
☆152Feb 19, 2022Updated 4 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 12 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- Python toolkit for injecting DLL files into running processes on Windows☆253Mar 19, 2017Updated 8 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- TinySHell port to SCTP☆130Oct 19, 2013Updated 12 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- python based backdoor software☆17Oct 14, 2011Updated 14 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 10 months ago
- Python PTY backdoors - full PTY or nothing!☆754Jul 28, 2014Updated 11 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Dec 5, 2014Updated 11 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37May 20, 2013Updated 12 years ago
- ☆133Nov 6, 2015Updated 10 years ago
- ☆15Jul 11, 2019Updated 6 years ago
- Exploits and research stuffs☆54Jan 19, 2026Updated last month
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Collection of modified open fuzzer.☆30Jun 9, 2012Updated 13 years ago
- Arya is a simple obfuscator for .NET binaries.☆37Dec 11, 2017Updated 8 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- Miscellaneous exploit code☆1,568Oct 6, 2023Updated 2 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- ☆231Nov 21, 2015Updated 10 years ago
- ☆52Apr 14, 2015Updated 10 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆891May 16, 2020Updated 5 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- Specify targets and run sets of tools against them☆386Apr 23, 2019Updated 6 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆353Jan 12, 2023Updated 3 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- ☆15Mar 2, 2014Updated 11 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- ☆196Sep 27, 2018Updated 7 years ago