Exploit scripts
☆12Apr 10, 2022Updated 3 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- ☆12Feb 20, 2025Updated last year
- ☆11Oct 7, 2022Updated 3 years ago
- ☆16Oct 30, 2022Updated 3 years ago
- CTF challenges WriteUp☆14Jun 27, 2022Updated 3 years ago
- Flutter SSL pinning bypass using IP forwarding☆49Feb 15, 2026Updated 2 weeks ago
- ☆18Apr 26, 2021Updated 4 years ago
- Single-WebApp-Target essentials testing methodology tool starting at recon-information gathering for the juicy stuff ended up in exploita…☆23Jun 15, 2021Updated 4 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- ☆27Jul 30, 2021Updated 4 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- Collection of Some Good research Documentation☆27Dec 10, 2017Updated 8 years ago
- ☆34Feb 15, 2021Updated 5 years ago
- ☆41Aug 8, 2023Updated 2 years ago
- Track HackerOne reports and leaderboard changes on programs through a Discord webhook☆34Jan 31, 2025Updated last year
- The purpose of #Learn365 collection is to create informational content in multiple codecs and share with the community to allow knowledge…☆103May 25, 2022Updated 3 years ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- ☆15Mar 21, 2025Updated 11 months ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- A demo PHP application used to exercise SQL injection techniques in a safe, local Docker environment☆45Jun 3, 2024Updated last year
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ☆10Feb 28, 2023Updated 3 years ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- ☆10Feb 8, 2024Updated 2 years ago
- ☆36Jun 15, 2021Updated 4 years ago
- Code dump from PEN-300/OSEP updated 2022☆43Aug 23, 2022Updated 3 years ago
- ☆46Nov 5, 2025Updated 3 months ago
- Penetration Testing Interview Questions☆53Apr 15, 2022Updated 3 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- Collection of all the resources published by Payatu.☆11Aug 11, 2025Updated 6 months ago
- ☆10Aug 11, 2025Updated 6 months ago
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- CTF collaboration tool for teams☆10Nov 10, 2017Updated 8 years ago
- A script to build a Docker image for a DNN Platform website☆10Feb 8, 2018Updated 8 years ago
- ☆16Updated this week
- Filter URLs that match your scope file for bugbounty.☆11May 23, 2023Updated 2 years ago