Various exploits, metasploit modules, etc.
☆15Jun 3, 2016Updated 9 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- js-beautifier extension for Burp Suite☆30Jun 24, 2013Updated 12 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- ☆18Feb 4, 2014Updated 12 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Twitter bots, IRC bots, bots that make other bots. The world of bots is limitless.☆19Sep 24, 2016Updated 9 years ago
- Python tools for interacting with a DarkComet Client☆54Aug 4, 2015Updated 10 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- A collection of Python code, useful for RF work☆13Sep 2, 2022Updated 3 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆91Sep 13, 2015Updated 10 years ago
- Fake msxfs.dll to debug ATM trojans☆56Sep 28, 2015Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 10 years ago
- MS15-076 Privilege Escalation☆101Sep 21, 2015Updated 10 years ago
- 🇫🇷 A list of neat projects made in France☆14Feb 13, 2025Updated last year
- ☆13Apr 29, 2016Updated 9 years ago
- JIT extensions for AsmResolver☆14May 19, 2019Updated 6 years ago
- A python script to enumerate CGI scripts vulnerable to CVE-2014-6271 on one specific server☆12Jun 19, 2015Updated 10 years ago
- Source code for 'Artificial Intelligence for .NET: Speech, Language, and Search' by Nishith Pathak☆12Oct 24, 2017Updated 8 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Jun 23, 2016Updated 9 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- Berliner Spargel OS☆12May 26, 2014Updated 11 years ago
- MASM Crypto Lib☆16Sep 27, 2015Updated 10 years ago
- Conquer the deep ocean, host an .onion site fast!☆16Oct 12, 2022Updated 3 years ago
- CANAPE Network Testing Tool☆184Jan 18, 2018Updated 8 years ago
- Bootkits Revisited☆39Jun 3, 2014Updated 11 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- ☆12Apr 11, 2020Updated 5 years ago
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆16Oct 10, 2016Updated 9 years ago
- Trigger and exploit code for CVE-2014-4113☆42Feb 14, 2016Updated 10 years ago
- Monitoring 'DNS' inside the Tor network☆93Nov 21, 2016Updated 9 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆32May 8, 2015Updated 10 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆30May 6, 2016Updated 9 years ago
- Clone of hidden tear written in C++☆70Oct 18, 2020Updated 5 years ago
- ☆18Feb 25, 2025Updated last year