The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers
☆460Nov 10, 2022Updated 3 years ago
Alternatives and similar repositories for exploitdb-papers
Users that are interested in exploitdb-papers are comparing it to the libraries listed below
Sorting:
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb-bin-sploits☆1,816Nov 10, 2022Updated 3 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,850Nov 10, 2022Updated 3 years ago
- Various Wireless Driver patches☆34Apr 24, 2019Updated 6 years ago
- EM4x RFID Harvester using a Robotics Connection reader☆16Sep 27, 2012Updated 13 years ago
- Various Kali Scripts☆60Dec 20, 2016Updated 9 years ago
- MASSCAN Web UI☆504Oct 26, 2022Updated 3 years ago
- ☆38Apr 24, 2019Updated 6 years ago
- ☆49Apr 24, 2019Updated 6 years ago
- poc or exp of android vulnerability☆407Dec 30, 2017Updated 8 years ago
- OpenSource My ImageMagick Fuzzer ..☆298Jul 26, 2017Updated 8 years ago
- kali-sly-pi☆36Apr 24, 2019Updated 6 years ago
- linux-kernel-exploits Linux平台提权漏洞集合☆5,586Jul 13, 2020Updated 5 years ago
- ☆24Apr 25, 2019Updated 6 years ago
- Windows Exploits☆1,292May 29, 2020Updated 5 years ago
- Struts2の脆弱性S2-045, S2-055 および Jackson の脆弱性 CVE-2017-7525, CVE-2017-15095 の調査報告☆107Dec 13, 2017Updated 8 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- Code-Audit-Challenges☆991Nov 17, 2018Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆591May 16, 2021Updated 4 years ago
- VMware Escape Exploit before VMware WorkStation 12.5.5☆914Nov 7, 2023Updated 2 years ago
- Post Exploitation Collection☆1,571May 1, 2020Updated 5 years ago
- Kali Linux Windows App chroot builder script☆47Apr 24, 2019Updated 6 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,483Oct 12, 2024Updated last year
- ☆48Nov 28, 2016Updated 9 years ago
- A collection of pentest and development tips☆1,126May 26, 2022Updated 3 years ago
- gcc-arm-eabi-linaro-4.6.2☆26Apr 24, 2019Updated 6 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,774Apr 3, 2024Updated last year
- Vulnerability Labs for security analysis☆1,170Mar 10, 2021Updated 5 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,458Oct 1, 2025Updated 5 months ago
- Script to create Kali Linux Amazon Machine Images (AMIs)☆93Apr 24, 2019Updated 6 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆202Nov 30, 2017Updated 8 years ago
- MS17-010☆2,233Jun 20, 2023Updated 2 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- ✍️ A curated list of CVE PoCs.☆3,484Jan 4, 2022Updated 4 years ago
- My proof-of-concept exploits for the Linux kernel☆1,568Sep 11, 2025Updated 6 months ago
- Kali Linux u-boot images☆31Apr 24, 2019Updated 6 years ago
- windows-kernel-exploits Windows平台提权漏洞集合☆8,612Jun 11, 2021Updated 4 years ago
- Miscellaneous exploit code☆1,569Oct 6, 2023Updated 2 years ago
- Web Security Technology & Vulnerability Analysis Whitepapers☆549Jan 1, 2019Updated 7 years ago