☆12Jan 11, 2020Updated 6 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- various exploits☆32Jul 7, 2012Updated 13 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Feb 20, 2016Updated 10 years ago
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- A collection of hacks and one-off scripts☆11Apr 6, 2020Updated 5 years ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode☆12Jul 30, 2021Updated 4 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- ☆11May 5, 2015Updated 10 years ago
- ☆13Apr 29, 2016Updated 9 years ago
- computer software application to flash bootloader and read ECUs status☆13Jul 3, 2018Updated 7 years ago
- IntelGPT is a command line tool that allows you to examine specific input such as URLs, file hashes, domain names, and IP addresses using…☆17Jan 16, 2023Updated 3 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- Tutorials and Things to Do while Hunting Vulnerability.☆10May 15, 2025Updated 10 months ago
- Compiler for the Jack Programming Language☆20Nov 5, 2024Updated last year
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A collection of hex utilities in python☆14Mar 1, 2013Updated 13 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Jun 3, 2014Updated 11 years ago
- Some helper tools for network pentest☆20Oct 2, 2013Updated 12 years ago
- ☆19Jul 2, 2024Updated last year
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- Networkscanner written in rust☆10May 29, 2020Updated 5 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- A pyhon script to do port scan via weblogic uuid☆10Oct 1, 2020Updated 5 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Cross-site request forgery Learning Platform☆21Sep 13, 2014Updated 11 years ago
- Evil domains for our Collective Hosts File Project that are not present in any other lists.☆14Mar 10, 2021Updated 5 years ago
- Academic project implementing basic first-hop LAN attacks such as DHCP starvation, ARP spoofing, DNS poisoning and more.☆18May 14, 2020Updated 5 years ago
- reverse engineering, visual binary analysis☆24Jan 9, 2017Updated 9 years ago
- ☆14Nov 1, 2023Updated 2 years ago