Mega repo for exploit development. Contains individual exploits and libraries to assist during exploitation
☆46Jun 17, 2022Updated 3 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of materials relating to FORCEDENTRY☆100Mar 30, 2024Updated 2 years ago
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- ☆21Nov 19, 2025Updated 4 months ago
- ☆15Nov 3, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Browser exploitation v8 and sandbox escape challenges with solutions.☆31May 10, 2022Updated 3 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆122Jul 21, 2022Updated 3 years ago
- Trigger-only for CVE-2021-29627☆13Apr 12, 2021Updated 4 years ago
- A python library to extract TCP sessions from PCAPs.☆25Nov 10, 2020Updated 5 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆52Mar 31, 2026Updated last week
- Exploiting a patched vulnerability in JavaScriptCore☆17Jan 2, 2020Updated 6 years ago
- Exploit for a bug in TurboFan's typing of JSCall nodes for builtins kStringLastIndexOf and kStringIndexOf☆60Apr 25, 2019Updated 6 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- ☆10Apr 10, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- AyedFuzzer is a small File-Format-Fuzzer with 3 options (File-mutating, WinDbg-interactive monitor, multi-processing) for windows executa…☆17Dec 2, 2024Updated last year
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.☆74Apr 8, 2022Updated 4 years ago
- I will provide details and pocs for some bugs I found.☆41Apr 15, 2024Updated last year
- Re-implementation of Apple's Continuity Protocol☆20Dec 5, 2019Updated 6 years ago
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- Elven relativism -- relocation and execution of aarch64 ELF relocatable objects (ET_REL)☆21Oct 13, 2025Updated 5 months ago
- This tool emulates an EMV-CAP device, to illustrate the article "Banque en ligne : à la decouverte d'EMV-CAP" published in MISC, issue #5…☆35Mar 26, 2026Updated 2 weeks ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆91Sep 10, 2013Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- An IOKit kext designed for microarchitectural security research on M1☆47Oct 30, 2022Updated 3 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- SPI flash read MitM attack PoC☆40May 24, 2022Updated 3 years ago
- Process hiding library☆19Feb 23, 2020Updated 6 years ago
- Reversed iOS sandbox profile files☆24Jun 6, 2020Updated 5 years ago
- Report and exploit of CVE-2024-21305.☆42Jan 14, 2024Updated 2 years ago
- Elasticsearch Stack Overflow Vulnerability☆18Sep 23, 2023Updated 2 years ago
- PCIDriverKit proof-of-concept for CVE-2022-26763☆37Jul 2, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Official Solution and Source Code for the "Mock Kernel" challenge from UIUCTF 2023☆49Jul 11, 2023Updated 2 years ago
- ☆130May 15, 2025Updated 10 months ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 2 months ago
- MacOS kernel memory leak (4 bytes)☆30Apr 14, 2020Updated 5 years ago
- This tool is used to generate Offensive Security Exploit Developer (OSED) exam report. This is a modified version of https://github.com/n…☆14Jan 19, 2025Updated last year
- Script to crawl crbugs (Chromium Issues).☆10Jul 15, 2021Updated 4 years ago
- ☆12Mar 28, 2022Updated 4 years ago