👽 Exploits written for research purposes.
☆11Nov 15, 2021Updated 4 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- Malware Analysis (Zararlı Yazılım Analizi)☆32Aug 1, 2019Updated 6 years ago
- Local File Inclusion (LFI) in FHEM 6.0 allows an attacker to include a file, it can lead to sensitive information disclosure.☆12Jan 20, 2021Updated 5 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Treck Network Stack Discovery Tool [Ripple20]☆12Jul 1, 2020Updated 5 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆13May 29, 2018Updated 7 years ago
- ☆16Jan 18, 2020Updated 6 years ago
- Offensive Security Wireless Professional☆17Mar 14, 2020Updated 5 years ago
- ICS/SCADA nmap script.☆18May 17, 2018Updated 7 years ago
- eLdap is a tool that helps users searching and filtering queries in Ldap environment.☆19Apr 22, 2022Updated 3 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- ☆122Mar 6, 2018Updated 7 years ago
- ☆23Jan 22, 2017Updated 9 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- Windows Privilege Escalation☆30Aug 14, 2020Updated 5 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Dec 29, 2017Updated 8 years ago
- MobSF related Presentations, Slides and Others.☆33Dec 20, 2017Updated 8 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Nov 9, 2021Updated 4 years ago
- Solutions for try2hack.nl (Levels 1-13)☆36Jun 23, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆38Oct 13, 2021Updated 4 years ago
- ☆145Jan 8, 2020Updated 6 years ago
- Python scripts to audit and harden the 2014-2017 Microsoft SQL Server☆10Jun 5, 2020Updated 5 years ago
- A Golang Implementation of a non-interactive Schnorr ZKP over Elliptic Curves☆10Sep 1, 2019Updated 6 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- IoTVulBench is an open-source benchmark dataset for IoT security research, containing firmware-related vulnerabilities and the correspond…☆18Dec 30, 2024Updated last year
- An application to test windows and linux shellcodes☆94Nov 6, 2024Updated last year
- Preparation for OSWE☆47Apr 19, 2020Updated 5 years ago
- Quick SOC L1 ticket structure☆40Jun 20, 2019Updated 6 years ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- Basic XSS Scanner☆11Jan 21, 2021Updated 5 years ago
- Foundations of Computer Science notebooks☆17Oct 13, 2025Updated 4 months ago
- Small snippets of code we often find useful☆11Nov 9, 2019Updated 6 years ago
- Just a vault template to help someone on the certificate.☆12Sep 3, 2025Updated 5 months ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- [FIC] Legislación y Seguridad Informática☆11Mar 3, 2014Updated 12 years ago
- Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resou…☆10Dec 3, 2020Updated 5 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago