☆17Jun 14, 2023Updated 2 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 11 months ago
- ☆12Sep 13, 2023Updated 2 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Monitor your target continuously for new subdomains!☆25Mar 18, 2023Updated 3 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆20Oct 9, 2021Updated 4 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Feb 24, 2022Updated 4 years ago
- Scanner for CVE-2023-46805 - Ivanti Connect Secure☆10Jul 23, 2024Updated last year
- Analysis and exploitation of an use-after-free in ProFTPd☆13Jun 21, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Jul 23, 2024Updated last year
- PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.☆57Jun 26, 2021Updated 4 years ago
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆29Apr 22, 2023Updated 2 years ago
- A simple Meterpreter stager written in Rust.☆44Nov 2, 2025Updated 5 months ago
- A windbg extension for ASLR/DEP/SafeSEH check☆28May 19, 2018Updated 7 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Exploit for CVE-2024-4885☆17Jul 8, 2024Updated last year
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆14May 11, 2023Updated 2 years ago
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- a pstree mod that prints other helpful information and with added functionality☆25Sep 5, 2020Updated 5 years ago
- ☆115Jan 8, 2025Updated last year
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 9 months ago
- ☆89Jan 2, 2024Updated 2 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- ☆38Jan 6, 2025Updated last year
- ☆412Dec 14, 2023Updated 2 years ago
- Corrupted files generator. Random bits flipper.☆29Oct 30, 2023Updated 2 years ago
- A collection of beautified and commented samples of malware implemented in Bash☆23Apr 4, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- linux kernel internals research details☆44Jan 9, 2024Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- How to develop your own zero day vulnerabilities for iOS☆30May 20, 2023Updated 2 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆27Nov 17, 2021Updated 4 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- INE eCPPTv3 Cheat Sheet / Course Notes. You'll find my comprehensive course notes, which also serve as cheat sheets for the eCPPTv3 cours…☆68Aug 24, 2025Updated 7 months ago