r4j0x00 / exploitsLinks
☆2,508Updated 2 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- ☆989Updated 4 years ago
- Pwn stuff.☆1,794Updated 3 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆831Updated 4 years ago
- Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability detai…☆3,160Updated 2 years ago
- ☆1,359Updated 5 years ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,382Updated 6 months ago
- PoC exploits for software vulnerabilities☆682Updated 4 years ago
- Burpsuite Extension to bypass 403 restricted directory☆1,639Updated 2 years ago
- CVE-2021-40444 PoC☆1,658Updated 3 years ago
- A root exploit for CVE-2022-0847 (Dirty Pipe)☆1,116Updated 3 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆803Updated 3 years ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,256Updated last week
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆3,191Updated 2 years ago
- Interactive CTF Exploration Tool☆1,661Updated 3 years ago
- 🕷️ A `.git` folder exploiting tool that is able to restore the entire Git repository, including stash, common branches and common tags.☆1,556Updated 2 months ago
- Proof of Concepts☆1,267Updated 10 months ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,330Updated 4 years ago
- shellcodeloader☆1,729Updated 4 years ago
- Microsoft » Windows 10 : Security Vulnerabilities☆928Updated 4 months ago
- Fake Protocol Server☆1,595Updated 8 months ago
- A modern multiple reverse shell sessions manager written in go☆1,609Updated this week
- PoC for CVE-2021-3156 (sudo heap overflow)☆437Updated 3 years ago
- Repository for information about 0-days exploited in-the-wild.☆829Updated 2 months ago
- Reverse proxies cheatsheet☆1,842Updated last year
- ✍️ A curated list of CVE PoCs.☆3,436Updated 3 years ago
- Linux/Windows post-exploitation framework made by linux user☆1,623Updated 2 weeks ago
- A malicious LDAP server for JNDI injection attacks☆1,056Updated last year
- Venom - A Multi-hop Proxy for Penetration Testers☆2,120Updated 3 years ago
- Test tool for CVE-2020-1472☆1,783Updated 2 months ago
- Reverse Shell as a Service☆1,917Updated last year