Some exploits and exploit development stuff.
☆153Feb 19, 2022Updated 4 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Mar 18, 2013Updated 13 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 12 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Python toolkit for injecting DLL files into running processes on Windows☆253Mar 19, 2017Updated 9 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 15 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆18Jan 29, 2012Updated 14 years ago
- Exploits and research stuffs☆54Jan 19, 2026Updated 4 months ago
- RatHole is a unix backdoor which compiles cleanly on standard linux and openbsd (probably other bsd flavours also) without addicional lib…☆37May 20, 2013Updated 13 years ago
- python based backdoor software☆17Oct 14, 2011Updated 14 years ago
- This rearranges an ELF object file so it can be used as shellcode.☆44Sep 12, 2014Updated 11 years ago
- TinySHell port to SCTP☆125Oct 19, 2013Updated 12 years ago
- Visualize an ELF's execution☆11Dec 28, 2014Updated 11 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆891May 16, 2020Updated 6 years ago
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆72Dec 5, 2014Updated 11 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆15Mar 2, 2014Updated 12 years ago
- Unofficial Kali Documentation Project☆160Feb 27, 2015Updated 11 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- 分布式的sqlmapapi☆11Sep 9, 2016Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Python PTY backdoors - full PTY or nothing!☆752Jul 28, 2014Updated 11 years ago
- Arya is a simple obfuscator for .NET binaries.☆37Dec 11, 2017Updated 8 years ago
- Miscellaneous exploit code☆1,565Oct 6, 2023Updated 2 years ago
- Peach Fuzzer Web Frontend☆51Jun 10, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆15Jul 11, 2019Updated 6 years ago
- Specify targets and run sets of tools against them☆388Apr 23, 2019Updated 7 years ago
- ☆134Nov 6, 2015Updated 10 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- ☆52Apr 14, 2015Updated 11 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆528Apr 13, 2017Updated 9 years ago
- Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional feat…☆807Mar 7, 2024Updated 2 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 13 years ago
- An example of a reverse RAT (remote administration tool / trojan horse) written in NodeJS. Highly experimental.☆16Aug 28, 2015Updated 10 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆17Nov 25, 2015Updated 10 years ago
- Exploit repository☆204Jul 6, 2015Updated 10 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆352Jan 12, 2023Updated 3 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆42Oct 28, 2015Updated 10 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆253Sep 27, 2023Updated 2 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago