Exploit scripts
☆12Apr 10, 2022Updated 3 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CTF challenges WriteUp☆14Jun 27, 2022Updated 3 years ago
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 11 months ago
- Parameter-Reflect-Finder is a python based tool that helps you find reflected parameters which can have potential XSS or Open redirection…☆16Aug 8, 2022Updated 3 years ago
- Single-WebApp-Target essentials testing methodology tool starting at recon-information gathering for the juicy stuff ended up in exploita…☆23Jun 15, 2021Updated 4 years ago
- Flutter Reverse Engineering Framework☆16Jul 24, 2023Updated 2 years ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Feb 21, 2022Updated 4 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- My progress through Google's 2020 CTF as a part of the CyberJanitorialSecurityServices team!☆21Sep 4, 2020Updated 5 years ago
- ☆12Feb 20, 2025Updated last year
- Flutter SSL pinning bypass using IP forwarding☆48Feb 15, 2026Updated last month
- Git repo to accompany the AWS DevOps Blog: Using AWS DevOps Tools to model and provision AWS Glue workflows☆19Nov 16, 2021Updated 4 years ago
- ☆11Oct 7, 2022Updated 3 years ago
- Jekyll theme for translated articles☆13Apr 3, 2019Updated 6 years ago
- Proof of Concept: HTTP/2 CONTINUATION Flood☆10Apr 7, 2024Updated last year
- ☆43Jun 18, 2025Updated 9 months ago
- ☆18Apr 26, 2021Updated 4 years ago
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- ☆13Feb 22, 2024Updated 2 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- Collection of Some Good research Documentation☆27Dec 10, 2017Updated 8 years ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- The purpose of #Learn365 collection is to create informational content in multiple codecs and share with the community to allow knowledge…☆103May 25, 2022Updated 3 years ago
- Contains Actual Events and Codes of Threat Groups, APTs, Research Groups☆19Sep 10, 2022Updated 3 years ago
- Code dump from PEN-300/OSEP updated 2022☆43Aug 23, 2022Updated 3 years ago
- mitigation script by disabling ipv6 of all interfaces☆14Aug 15, 2024Updated last year
- ☆10Feb 8, 2024Updated 2 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Digging into private data through Sonarcloud public projects☆11Sep 13, 2024Updated last year
- All challenges and writups of the GlacierCTF 2023☆16Feb 15, 2024Updated 2 years ago
- privilege escalation by piggy-backing user sudo requests☆11Feb 6, 2023Updated 3 years ago
- Shellcode generation and encoding utility☆24Jul 13, 2022Updated 3 years ago
- EduRansW (Vulnransomware) An safe-to-use vulnerable ransomware designed to learn about reversing and exploitation of basic ransomware vri…