r0t0tiller / Exploits
Collection of 0days & Ndays
☆165Updated 4 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- This project is used to collect the EXP/POC disclosed on the Internet and provide project support for Heptagram security team.☆81Updated 11 months ago
- ☆111Updated 5 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆185Updated 4 years ago
- Weblogic com.tangosol.util.extractor.ReflectionExtractor RCE☆176Updated 2 years ago
- CVE-2019-1458 Windows LPE Exploit☆135Updated 5 years ago
- weaponized tool for CVE-2020-17144☆159Updated 4 years ago
- ClamAV_0Day_exploit☆89Updated 5 years ago
- Weblogic coherence.jar RCE☆176Updated 5 years ago
- shellcode 异或加密并生成dll☆249Updated 4 years ago
- about CobaltStrike☆150Updated last year
- anti AV☆292Updated 5 years ago
- ☆62Updated 3 years ago
- nim一键免杀☆214Updated 4 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆140Updated 4 years ago
- ☆80Updated 4 years ago
- WarSQLKit is a fileless rootkit and attack tool I developed for MS-SQL. With this tool you can rootkit the SQL service that uses CLR on M…☆255Updated last year
- Behinder3.0 Beta4 源码(Decompile and Fixed)☆206Updated 4 years ago
- Linux C2 框架demo,为期2周的”黑客编程马拉松“,从学习编程语言开始到实现一个demo的产物☆224Updated 2 years ago
- 修改的SweetPotato,使之可以用于CobaltStrike v4.0☆244Updated 5 years ago
- CVE-2019-2725命令回显+webshell上传+最新绕过☆190Updated 5 years ago
- Apache Solr Exploits 🌟☆340Updated 4 years ago
- Exploit and detect tools for CVE-2020-0688☆354Updated 5 years ago
- WINDOWS TELEMETRY权限维持☆258Updated 4 years ago
- CVE-2021-3156非交互式执行命令☆202Updated 4 years ago
- A tool for quickly generating fishing Trojan horse.☆95Updated 3 years ago
- 利用NTLM Hash读取Exchange邮件☆422Updated 4 months ago
- Shiro-721 RCE Via RememberMe Padding Oracle Attack☆260Updated 4 years ago
- Exchange2010 authorized RCE☆155Updated 4 years ago
- A JSP backdoor that enables under Tomcat hiding arbitrary JSP files, in addition to their access logs.☆214Updated 6 years ago
- exploit for fastjson remote code execution vulnerability☆152Updated 2 years ago