maldevel / exploitsLinks
Various exploits
☆10Updated 8 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- Software exploitation training material☆16Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 8 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆21Updated 11 years ago
- SIP hacking tools and scripts☆23Updated 5 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated last week
- Open-source Exploiting Framework☆30Updated 8 years ago
- SWF Vulnerability & Information Scanner☆18Updated 7 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- Wireless Miniaturized Device☆19Updated 7 years ago
- Search bing with python☆12Updated 11 years ago
- Scripts used for phishing campaigns☆14Updated 11 years ago
- Notes on offensive training☆16Updated 8 years ago
- Password cracking utility☆54Updated 4 years ago
- python tools to assist in penetration testing☆14Updated last week
- PHP Phishing Framework☆28Updated 11 years ago
- recon-ng Maltego local transform pack☆41Updated 12 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Updated 8 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 8 years ago
- All xxx-arsenal repos in one☆17Updated 6 years ago
- Collection of Nmap scripts☆10Updated 10 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 10 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Updated 9 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Updated 8 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Honeypot for router backdoor (TCP 32764)☆19Updated 11 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago