☆19Aug 31, 2021Updated 4 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit iDRAC 7 & 8 firmware < 2.52.52.52☆18Dec 10, 2021Updated 4 years ago
- EyesOfNetwork 5.1 to 5.3 exploits☆13Mar 5, 2020Updated 6 years ago
- ☆16Nov 11, 2022Updated 3 years ago
- Some Of Huawei Routers Exploits☆15Sep 1, 2016Updated 9 years ago
- ☆11Feb 28, 2020Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- Homo Network - The best ddos botnet in 2023☆13Apr 27, 2023Updated 3 years ago
- ☆11Jan 31, 2020Updated 6 years ago
- Encrypted botnet traffic generator☆11Jan 26, 2016Updated 10 years ago
- Proof of concept for the command injection vulnerability affecting the ZTE MF286R router, including an RCE exploit.☆11Jan 7, 2023Updated 3 years ago
- sap netweaver 0day poc by shinyhunters (scattered lapsus$ hunters) affecting all 7.x CVE-2025-31324☆22Aug 15, 2025Updated 8 months ago
- BlitzSSH is a multi-threaded SSH brute-force tool with Telegram integration for real-time notifications.☆15Nov 20, 2025Updated 5 months ago
- Peer to Peer botnet☆13Aug 7, 2020Updated 5 years ago
- A small SSH server written in Go that checks for weak SSH keys☆14Feb 26, 2016Updated 10 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆18Sep 22, 2018Updated 7 years ago
- ☆11Nov 28, 2016Updated 9 years ago
- 🔐 Wrap keys from HSM using CKM_RSA_AES_KEY_WRAP step by step☆13Dec 10, 2021Updated 4 years ago
- This is a Telegram bot designed to back up messages and media files from Telegram chats to a local file system and a SQLite database. It …☆16Aug 20, 2024Updated last year
- DES Rainbow Table Online Phase☆24Aug 2, 2017Updated 8 years ago
- ☆11Apr 8, 2024Updated 2 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Dec 9, 2017Updated 8 years ago
- MASS CVE-2021-41773☆29Nov 14, 2023Updated 2 years ago
- MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques☆15Dec 18, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆17Aug 19, 2024Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Node scraper that checks for links in different places and creates a json file with a direct reference to any mega.co.nz links posted in …☆16Jul 23, 2017Updated 8 years ago
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 7 years ago
- Simple SSH brute-forcer written in Go☆24May 29, 2016Updated 9 years ago
- TP-Link modem API. Tested with m7200 LTE and m7000 LTE☆22Feb 17, 2024Updated 2 years ago
- Tool for CVE-2022-1388☆14May 13, 2022Updated 3 years ago
- mega.nz direct link generator☆21Jun 19, 2025Updated 10 months ago
- A Linux backdoor with the goal of circumventing network firewalls.☆16Nov 30, 2011Updated 14 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆18Sep 10, 2021Updated 4 years ago
- RekSai 多个工具的功能结合起来,然后自动信息收集,保存结果☆11Nov 10, 2020Updated 5 years ago
- Backend app of https://amenitypj.in/asn1Play https://impratikjaiswal.github.io/asn1Play☆15Mar 21, 2026Updated last month
- A Powershell script that looks for specific emails in an exchange users mailbox, downloads the attachments, then marks those emails as re…☆17Apr 22, 2024Updated 2 years ago
- 本项目是针对 FnOS 系统的综合漏洞利用工具,提供 Web UI (网页版) 和 Desktop GUI (桌面版) 两种交互模式,整合了资产管理、漏洞扫描、文件浏览、远程命令执行 (RCE) 及凭据窃取等核心功能。☆29Feb 7, 2026Updated 2 months ago
- ☆114Aug 25, 2023Updated 2 years ago
- Pairwise Ranking Aggregation in a Crowdsourced Setting☆13Apr 13, 2014Updated 12 years ago