r4j0x00 / exploitsLinks
☆2,510Updated 3 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- ☆1,001Updated 4 years ago
- Pwn stuff.☆1,804Updated 3 years ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,460Updated this week
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆833Updated 4 years ago
- PoC exploits for software vulnerabilities☆686Updated 4 years ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,516Updated 2 months ago
- Proof of Concepts☆1,319Updated last year
- Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability detai…☆3,191Updated 2 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆801Updated 3 years ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,125Updated 3 years ago
- Burpsuite Extension to bypass 403 restricted directory☆1,652Updated 2 years ago
- shellcodeloader☆1,743Updated 5 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,345Updated 5 years ago
- ☆1,373Updated 5 years ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,268Updated 2 years ago
- Microsoft » Windows 10 : Security Vulnerabilities☆922Updated last month
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆2,471Updated last year
- Awesome Burp Suite Resources. 400+ open source Burp plugins, 400+ posts and videos.☆1,036Updated 5 years ago
- ✍️ A curated list of CVE PoCs.☆3,468Updated 4 years ago
- Next-Generation Linux Kernel Exploit Suggester☆1,953Updated 2 years ago
- C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527☆1,953Updated 4 years ago
- Proof of concept for CVE-2019-0708☆1,184Updated 4 years ago
- 🕷️ A `.git` folder exploiting tool that is able to restore the entire Git repository, including stash, common branches and common tags.☆1,601Updated 2 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock☆7,083Updated last year
- ☆2,665Updated last year
- Interactive CTF Exploration Tool☆1,664Updated 4 years ago
- A collection of tiny XSS Payloads that can be used in different contexts. https://tinyxss.terjanq.me☆2,261Updated last year
- ☆3,641Updated 11 months ago
- NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewa…☆1,955Updated 2 years ago
- Linux/Windows post-exploitation framework made by linux user☆1,662Updated this week