Various exploits, metasploit modules, etc.
☆15Jun 3, 2016Updated 9 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- js-beautifier extension for Burp Suite☆30Jun 24, 2013Updated 12 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Oct 25, 2015Updated 10 years ago
- Various cryptographic backdoors and tools to detect them☆21Sep 5, 2015Updated 10 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- List of PowerShell scripts conjured up for my consumption (you are welcome to use)☆36Oct 17, 2013Updated 12 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 6 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Python tools for interacting with a DarkComet Client☆54Aug 4, 2015Updated 10 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- A collection of Python code, useful for RF work☆13Sep 2, 2022Updated 3 years ago
- Various malware, packer, crypter, etc. detection and analysis tools☆91Sep 13, 2015Updated 10 years ago
- Fake msxfs.dll to debug ATM trojans☆58Sep 28, 2015Updated 10 years ago
- Generate MAEC XML from Ero Carrera's pefile output☆15Mar 6, 2017Updated 9 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Misc IDA Pro scripts☆23Oct 17, 2016Updated 9 years ago
- Network Forensics Workshop Files☆17Apr 21, 2015Updated 11 years ago
- MS15-076 Privilege Escalation☆101Sep 21, 2015Updated 10 years ago
- An bootable 'evil maid' tool that pretends to be Windows CHKDSK☆79Feb 8, 2019Updated 7 years ago
- ☆13Apr 29, 2016Updated 10 years ago
- JIT extensions for AsmResolver☆14May 19, 2019Updated 7 years ago
- A python script to enumerate CGI scripts vulnerable to CVE-2014-6271 on one specific server☆12Jun 19, 2015Updated 10 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Jun 23, 2016Updated 9 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Conquer the deep ocean, host an .onion site fast!☆16Oct 12, 2022Updated 3 years ago
- Bootkits Revisited☆39Jun 3, 2014Updated 11 years ago
- ☆12Apr 11, 2020Updated 6 years ago
- Quelques ressources générales partagées pour l'enseignement de la philosophie☆11Mar 21, 2025Updated last year
- Exposing the Neutrino EK: All the Naughty Bits (BSidesLV16)☆16Oct 10, 2016Updated 9 years ago
- Trigger and exploit code for CVE-2014-4113☆41Feb 14, 2016Updated 10 years ago
- Old exploits and code for my self-referencing PML4 technique (2014)☆31May 8, 2015Updated 11 years ago
- Monitoring 'DNS' inside the Tor network☆93Nov 21, 2016Updated 9 years ago
- Clone of hidden tear written in C++☆71Oct 18, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Landing page for MAEC docs☆23Oct 22, 2022Updated 3 years ago
- ☆18Feb 25, 2025Updated last year
- .net debugger / msil interpreter / emulator☆16Oct 26, 2018Updated 7 years ago
- Project for a Computer Security class based on CSAW capture the flag challenges☆13Mar 19, 2014Updated 12 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31May 6, 2016Updated 10 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 3 years ago
- ☆108Jul 18, 2017Updated 8 years ago