The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers
☆462Nov 10, 2022Updated 3 years ago
Alternatives and similar repositories for exploitdb-papers
Users that are interested in exploitdb-papers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb-bin-sploits☆1,822Nov 10, 2022Updated 3 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,861Nov 10, 2022Updated 3 years ago
- Various Wireless Driver patches☆35Apr 24, 2019Updated 7 years ago
- EM4x RFID Harvester using a Robotics Connection reader☆16Sep 27, 2012Updated 13 years ago
- Various Kali Scripts☆61Dec 20, 2016Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- MASSCAN Web UI☆503Oct 26, 2022Updated 3 years ago
- ☆39Apr 24, 2019Updated 7 years ago
- ☆50Apr 24, 2019Updated 7 years ago
- poc or exp of android vulnerability☆407Dec 30, 2017Updated 8 years ago
- OpenSource My ImageMagick Fuzzer ..☆297Jul 26, 2017Updated 8 years ago
- kali-sly-pi☆36Apr 24, 2019Updated 7 years ago
- linux-kernel-exploits Linux平台提权漏洞集合☆5,596Jul 13, 2020Updated 5 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- Windows Exploits☆1,297May 29, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- Code-Audit-Challenges☆990Nov 17, 2018Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆592May 16, 2021Updated 4 years ago
- ☆25Apr 25, 2019Updated 7 years ago
- VMware Escape Exploit before VMware WorkStation 12.5.5☆912Nov 7, 2023Updated 2 years ago
- Post Exploitation Collection☆1,573May 1, 2020Updated 5 years ago
- Kali Linux Windows App chroot builder script☆47Apr 24, 2019Updated 7 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,489Oct 12, 2024Updated last year
- ☆48Nov 28, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A collection of pentest and development tips☆1,128May 26, 2022Updated 3 years ago
- gcc-arm-eabi-linaro-4.6.2☆26Apr 24, 2019Updated 7 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,806Apr 3, 2024Updated 2 years ago
- Vulnerability Labs for security analysis☆1,171Mar 10, 2021Updated 5 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,474Oct 1, 2025Updated 6 months ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆94Apr 24, 2019Updated 7 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆202Nov 30, 2017Updated 8 years ago
- MS17-010☆2,241Jun 20, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ntlm relay attack to Exchange Web Services☆333Jan 15, 2018Updated 8 years ago
- ✍️ A curated list of CVE PoCs.☆3,499Jan 4, 2022Updated 4 years ago
- Kali Linux u-boot images☆32Apr 24, 2019Updated 7 years ago
- My proof-of-concept exploits for the Linux kernel☆1,574Sep 11, 2025Updated 7 months ago
- windows-kernel-exploits Windows平台提权漏洞集合☆8,651Jun 11, 2021Updated 4 years ago
- Miscellaneous exploit code☆1,567Oct 6, 2023Updated 2 years ago
- Web Security Technology & Vulnerability Analysis Whitepapers☆550Jan 1, 2019Updated 7 years ago