The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers
☆462Nov 10, 2022Updated 3 years ago
Alternatives and similar repositories for exploitdb-papers
Users that are interested in exploitdb-papers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb-bin-sploits☆1,820Nov 10, 2022Updated 3 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,857Nov 10, 2022Updated 3 years ago
- Various Wireless Driver patches☆35Apr 24, 2019Updated 7 years ago
- EM4x RFID Harvester using a Robotics Connection reader☆16Sep 27, 2012Updated 13 years ago
- Various Kali Scripts☆61Dec 20, 2016Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- MASSCAN Web UI☆503Oct 26, 2022Updated 3 years ago
- ☆39Apr 24, 2019Updated 7 years ago
- ☆50Apr 24, 2019Updated 7 years ago
- poc or exp of android vulnerability☆406Dec 30, 2017Updated 8 years ago
- OpenSource My ImageMagick Fuzzer ..☆296Jul 26, 2017Updated 8 years ago
- kali-sly-pi☆36Apr 24, 2019Updated 7 years ago
- linux-kernel-exploits Linux平台提权漏洞集合☆5,599Jul 13, 2020Updated 5 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- Windows Exploits☆1,296May 29, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- CVE-2018-8021 Proof-Of-Concept and Exploit☆105Dec 3, 2018Updated 7 years ago
- Code-Audit-Challenges☆988Nov 17, 2018Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 5 years ago
- ☆25Apr 25, 2019Updated 7 years ago
- VMware Escape Exploit before VMware WorkStation 12.5.5☆911Nov 7, 2023Updated 2 years ago
- Post Exploitation Collection☆1,575May 1, 2020Updated 6 years ago
- Kali Linux Windows App chroot builder script☆47Apr 24, 2019Updated 7 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,494Oct 12, 2024Updated last year
- ☆48Nov 28, 2016Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A collection of pentest and development tips☆1,128May 26, 2022Updated 3 years ago
- gcc-arm-eabi-linaro-4.6.2☆26Apr 24, 2019Updated 7 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,813Apr 3, 2024Updated 2 years ago
- Vulnerability Labs for security analysis☆1,168Mar 10, 2021Updated 5 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,480Oct 1, 2025Updated 7 months ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆94Apr 24, 2019Updated 7 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆201Nov 30, 2017Updated 8 years ago
- MS17-010☆2,246Jun 20, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ntlm relay attack to Exchange Web Services☆333Jan 15, 2018Updated 8 years ago
- ✍️ A curated list of CVE PoCs.☆3,502Jan 4, 2022Updated 4 years ago
- Kali Linux u-boot images☆32Apr 24, 2019Updated 7 years ago
- My proof-of-concept exploits for the Linux kernel☆1,575Sep 11, 2025Updated 8 months ago
- windows-kernel-exploits Windows平台提权漏洞集合☆8,655Jun 11, 2021Updated 4 years ago
- Miscellaneous exploit code☆1,565Oct 6, 2023Updated 2 years ago
- Web Security Technology & Vulnerability Analysis Whitepapers☆549Jan 1, 2019Updated 7 years ago