Customize Exploit Codes.
☆18Dec 1, 2016Updated 9 years ago
Alternatives and similar repositories for Exploit
Users that are interested in Exploit are comparing it to the libraries listed below
Sorting:
- Proof of concept exploit codes for vulnerabilities.☆11May 8, 2014Updated 11 years ago
- Some kernel exploit i wrote☆77Jan 9, 2015Updated 11 years ago
- OpenSSH 7.7 - Username Enumeration☆17Oct 23, 2020Updated 5 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- ☆52Oct 5, 2016Updated 9 years ago
- ☆16Mar 4, 2019Updated 6 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Supporting Files on my analysis of the malware designated hdroot.☆59Feb 23, 2017Updated 9 years ago
- cryptopals answers☆23Oct 28, 2016Updated 9 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Aug 14, 2017Updated 8 years ago
- Password Guessing for different Web Portals☆29Nov 14, 2018Updated 7 years ago
- NTPD remote DOS exploit and vulnerable container☆25Oct 30, 2017Updated 8 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- ANWI - All New Wireless IDS☆28Nov 28, 2025Updated 2 months ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- Struts2 S2-045(CVE-2017-5638)Exp with GUI☆61Mar 13, 2017Updated 8 years ago
- ☆39Sep 2, 2012Updated 13 years ago
- CVE-2017-9791☆27Jul 8, 2017Updated 8 years ago
- Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing☆33Jul 19, 2021Updated 4 years ago
- cve-2019-11931☆35Nov 16, 2019Updated 6 years ago
- Demo of CloudPets toy functionality using Web Bluetooth☆31Mar 8, 2017Updated 8 years ago
- ☆77Feb 17, 2017Updated 9 years ago
- CVE-2016-2776☆27Oct 3, 2016Updated 9 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- SMB Auto authentication Vulnerability☆34Aug 1, 2016Updated 9 years ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- Demo Application and Exploit☆35Mar 13, 2017Updated 8 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Sep 19, 2017Updated 8 years ago
- A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611)☆37Sep 8, 2017Updated 8 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Nov 15, 2024Updated last year
- ☆10Jun 1, 2014Updated 11 years ago
- POC for CVE-2018-4327☆42Sep 13, 2018Updated 7 years ago
- ☆11Jul 10, 2024Updated last year
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- My public presentations☆42May 10, 2023Updated 2 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month