Exploits and advisories
☆207Dec 29, 2025Updated 3 months ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆229May 10, 2018Updated 7 years ago
- Random source codes☆26Dec 22, 2025Updated 3 months ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- HTA encryption tool for RedTeams☆1,423Nov 9, 2022Updated 3 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- PowerShell Runspace Post Exploitation Toolkit☆1,549Aug 2, 2019Updated 6 years ago
- Proof of calc for CVE-2019-6453☆50Jan 1, 2024Updated 2 years ago
- PowerShell ReverseTCP Shell - Framework☆1,065Sep 18, 2022Updated 3 years ago
- How To Execute Shellcode via HTA☆141Feb 23, 2018Updated 8 years ago
- Implementation of the .NET Profiler DLL hijack in C#☆98Dec 14, 2018Updated 7 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆107May 25, 2020Updated 5 years ago
- DLL Generator for side loading attack☆175Feb 5, 2019Updated 7 years ago
- exp of CVE-2018-15982☆181Jan 4, 2019Updated 7 years ago
- Lateral Movement technique using DCOM and HTA