r4j0x00 / exploitsLinks
☆2,511Updated 3 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- ☆1,001Updated 4 years ago
- Pwn stuff.☆1,806Updated 3 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆833Updated 4 years ago
- PoC exploits for software vulnerabilities☆687Updated 4 years ago
- ☆1,372Updated 5 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,346Updated 5 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆801Updated 3 years ago
- Proof of Concepts☆1,319Updated last year
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,125Updated 3 years ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,494Updated this week
- Burpsuite Extension to bypass 403 restricted directory☆1,659Updated 2 years ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,544Updated 2 months ago
- An OOB interaction gathering server and client library☆4,137Updated last week
- Apache Log4j 远程代码执行☆88Updated 2 years ago
- Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability detai…☆3,191Updated 2 years ago
- Microsoft » Windows 10 : Security Vulnerabilities☆923Updated 2 months ago
- ☆1,281Updated 8 months ago
- ✍️ A curated list of CVE PoCs.☆3,476Updated 4 years ago
- shellcodeloader☆1,749Updated 5 years ago
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆2,480Updated last year
- Proof of concept for CVE-2019-0708☆1,185Updated 4 years ago
- 🕷️ A `.git` folder exploiting tool that is able to restore the entire Git repository, including stash, common branches and common tags.☆1,601Updated 2 months ago
- Interactive CTF Exploration Tool☆1,664Updated 4 years ago
- Venom - A Multi-hop Proxy for Penetration Testers☆2,144Updated 3 years ago
- A malicious LDAP server for JNDI injection attacks☆1,072Updated 2 years ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,280Updated 2 years ago
- CVE-2021-40444 PoC☆1,705Updated 4 years ago
- Test tool for CVE-2020-1472☆1,804Updated 7 months ago
- Reverse Shell as a Service☆1,951Updated 2 years ago
- Next-Generation Linux Kernel Exploit Suggester☆1,957Updated 2 years ago