☆18Aug 31, 2021Updated 4 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- Exploit iDRAC 7 & 8 firmware < 2.52.52.52☆16Dec 10, 2021Updated 4 years ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- ☆14Aug 31, 2021Updated 4 years ago
- DES Rainbow Table Online Phase☆25Aug 2, 2017Updated 8 years ago
- A script that generates a pdf file. You can create a new pdf file from an html file or you can write on top of an already existing pdf☆10Nov 18, 2022Updated 3 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- ☆15Sep 4, 2024Updated last year
- ☆16Nov 11, 2022Updated 3 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- ☆12Jan 31, 2020Updated 6 years ago
- for the momery of ZheLi☆10Nov 13, 2020Updated 5 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12May 20, 2015Updated 10 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Interactive C Programming Self-Learning Course☆24Oct 6, 2025Updated 4 months ago
- Software of development with Golang☆10Apr 13, 2021Updated 4 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- ☆11Feb 28, 2020Updated 6 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- Banned word lists for use with Lithnet Password Protection for Active Directory☆12Jul 10, 2023Updated 2 years ago
- Twilio log viewer / dashboard replacement. Faster than the Twilio API☆11Mar 21, 2024Updated last year
- Collection of Sphinx extensions similar to (but more flexible than) numpydoc☆12Updated this week
- 哥斯拉源码-v3.03-godzilla☆11May 12, 2022Updated 3 years ago
- Our interviewing prep resources.☆10Jan 12, 2016Updated 10 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Shell intended for forwarding-only ssh connection via jumphost☆11Jun 27, 2018Updated 7 years ago
- RekSai 多个工具的功能结合起来,然后自动信息收集,保存结果☆11Nov 10, 2020Updated 5 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Returns a list of all Public IP addresses being used by your AWS account. You can configure which regions you want to query.☆14Jun 7, 2020Updated 5 years ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- CVE-2022-3910☆12Mar 14, 2023Updated 2 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago