maldevel / exploitsLinks
Various exploits
☆10Updated 8 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- Software exploitation training material☆16Updated 8 years ago
- Search bing with python☆12Updated 11 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆12Updated 4 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- SWF Vulnerability & Information Scanner☆18Updated 7 years ago
- Proof of concept for a security issue (in my opinion) that I found in accounts.google.com☆22Updated 11 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- recon-ng Maltego local transform pack☆41Updated 12 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Updated 3 weeks ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 8 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- PHP Phishing Framework☆28Updated 12 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆40Updated 10 years ago
- Docker container for datasploit framework☆25Updated 8 years ago
- SIP hacking tools and scripts☆23Updated 5 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago
- Port scanning and domain utility.☆29Updated 8 years ago
- Notes on offensive training☆16Updated 8 years ago
- Vulnerability Scanner☆11Updated 11 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- Search Nmap and Metasploit scanning scripts.☆53Updated 8 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- Scripts used for phishing campaigns☆14Updated 11 years ago
- Get clients and access points.☆48Updated 6 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 11 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Updated 6 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆23Updated 9 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Updated 8 years ago