☆18Aug 31, 2021Updated 4 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Aug 31, 2021Updated 4 years ago
- A Lazy Programmer's Tips for Avoiding the SOC ~ BSides Belfast 2024☆16Sep 12, 2024Updated last year
- 1C changes logging extension☆11Aug 15, 2025Updated 7 months ago
- Twilio log viewer / dashboard replacement. Faster than the Twilio API☆11Mar 21, 2024Updated 2 years ago
- Lsp-config extension, that make bsl and oscript lsp server work in neovim☆12Nov 17, 2021Updated 4 years ago
- reveal xored strings in mirai binary☆12Oct 24, 2018Updated 7 years ago
- ☆12Jan 31, 2020Updated 6 years ago
- A minimalistic LDAP server that is meant for test vulnerability to JNDI+LDAP injection attacks in Java, especially CVE-2021-44228.☆11Dec 13, 2021Updated 4 years ago
- ☆11Nov 28, 2016Updated 9 years ago
- 🔐 Wrap keys from HSM using CKM_RSA_AES_KEY_WRAP step by step☆13Dec 10, 2021Updated 4 years ago
- DES Rainbow Table Online Phase☆24Aug 2, 2017Updated 8 years ago
- ☆11Apr 8, 2024Updated last year
- ☆16Aug 19, 2024Updated last year
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- A Linux backdoor with the goal of circumventing network firewalls.☆16Nov 30, 2011Updated 14 years ago
- 哥斯拉源码-v3.03-godzilla☆11May 12, 2022Updated 3 years ago
- RekSai 多个工具的功能结合起来,然后自动信息收集,保存结果☆11Nov 10, 2020Updated 5 years ago
- A Powershell script that looks for specific emails in an exchange users mailbox, downloads the attachments, then marks those emails as re…☆17Apr 22, 2024Updated last year
- Pairwise Ranking Aggregation in a Crowdsourced Setting☆13Apr 13, 2014Updated 11 years ago
- A sshpass implementation for Linux and Mac in Go☆20May 16, 2024Updated last year
- Proof of Concept for a VSCode Python Extension Code Execution Vulnerability☆16Mar 17, 2020Updated 6 years ago
- HP printer security research code☆55Nov 20, 2017Updated 8 years ago
- Linux C program collection☆10Nov 25, 2024Updated last year
- Unpacking tool for the zipExec Crypter☆14Oct 30, 2021Updated 4 years ago
- CVE-2023-23192☆13Mar 27, 2023Updated 2 years ago
- ☆11Nov 30, 2020Updated 5 years ago
- ☆16May 29, 2024Updated last year
- Banned word lists for use with Lithnet Password Protection for Active Directory☆12Jul 10, 2023Updated 2 years ago
- Highly scalable pipes for communicating with devices all over the place.☆19Aug 20, 2025Updated 7 months ago
- 常用系统服务默认端口列表☆13Apr 25, 2017Updated 8 years ago
- A command line tool to interact with Microsoft Graph API☆23May 27, 2024Updated last year
- Firmware and research tools for Nordic Semiconductor nRF24LU1+ based USB dongles and breakout boards.☆15Aug 12, 2024Updated last year
- Encrypt and decrypt YAML documents☆21Dec 13, 2023Updated 2 years ago
- ☆61Feb 12, 2026Updated last month
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆77Oct 6, 2023Updated 2 years ago
- Enumeration & fingerprint tool☆23Mar 3, 2024Updated 2 years ago
- ☆14Mar 28, 2018Updated 7 years ago
- Ransomware Simulator for Red/Blue teams to test their defences.☆19Apr 4, 2022Updated 3 years ago
- CLI to extract a Switch's SSL certificate from PRODINFO☆19Oct 10, 2020Updated 5 years ago