Knowledge Base of Exploitation Techniques
☆61Apr 30, 2025Updated 11 months ago
Alternatives and similar repositories for exploitation-grimoire
Users that are interested in exploitation-grimoire are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Pwning Toolkit☆28Jan 11, 2025Updated last year
- Some guides about general topics on information security☆13Mar 19, 2019Updated 7 years ago
- Proof Of Concepts☆56Jan 4, 2026Updated 3 months ago
- 🌠 The World's Fastest StegCracker 🌠☆29Oct 10, 2020Updated 5 years ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆26Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- The tool was created to assist with fuzzing and exploiting stack-based buffer overflows☆10Dec 29, 2020Updated 5 years ago
- Don't expect much :) Just expect to learn new things!☆64Mar 11, 2021Updated 5 years ago
- Generate image payloads in JS to bypass filters☆39Mar 16, 2021Updated 5 years ago
- POC For CVE-2022-24483☆15Apr 12, 2022Updated 3 years ago
- Viruses for the public to test.☆10Aug 11, 2018Updated 7 years ago
- All checklists☆27Mar 26, 2019Updated 7 years ago
- 🌈👾 cli to choose your hyper-pokemon theme directly from terminal☆12Mar 6, 2018Updated 8 years ago
- ☆23Jul 18, 2023Updated 2 years ago
- CLI tool to get the links of original writeups from ctftime.org☆31Mar 22, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- hack vm☆12Nov 30, 2019Updated 6 years ago
- Vulnerable Windows 32bit executables for OSCP exam training☆19Dec 12, 2020Updated 5 years ago
- A bunch of shenanigans using functions, VEH and more☆38Jun 8, 2025Updated 10 months ago
- ☆11May 14, 2021Updated 4 years ago
- ☆13Jul 24, 2021Updated 4 years ago
- 🌯 Give me a web shell, I'll give you a terminal.☆197Dec 29, 2021Updated 4 years ago
- CTFs I've played so far☆18Feb 1, 2025Updated last year
- My own collection about Linux kernel exploitation including CVEs, CTF challenges, papers and all other interesting things : )☆86Jul 9, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Windows 7 Professional 7601 Service Pack 1 is vulnerable to eternalblue exploit and while exploiting this myself i ran into a number of i…☆11Jun 27, 2021Updated 4 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacy…☆17Dec 25, 2024Updated last year
- some pwn or re challenge in ctf games☆40Sep 24, 2019Updated 6 years ago
- Identifies LOLDrivers that are not blocked by the active HVCI policy — ideal for BYOVD scenarios.☆34Feb 1, 2026Updated 2 months ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆17Sep 10, 2024Updated last year
- Proof of concept tool used for phishing multi-factor authentication on O365☆14Aug 8, 2018Updated 7 years ago
- Tools for bug hunting in a container☆21Aug 18, 2023Updated 2 years ago
- Challenges and solutions for Maple CTF 2022.☆28Sep 15, 2022Updated 3 years ago
- Exploit for hardcore pwnable☆35Apr 14, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This is a PWN challenges repo.######## 1f y0u l1ke, g1v3 m3 a star~☆34Nov 21, 2020Updated 5 years ago
- Reflective DLL self-loading as a library☆21May 3, 2025Updated 11 months ago
- ☆18Dec 9, 2023Updated 2 years ago
- A pin tool to visualise heap operations☆21May 6, 2015Updated 10 years ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46May 31, 2023Updated 2 years ago
- redpwn's challenge deployment system☆28Dec 22, 2023Updated 2 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year