Exploits for some of the vulnerabilities I have discovered
☆18Aug 3, 2020Updated 5 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- Revisiting Helpviewer.app to hack Parallels for Mac☆17Sep 14, 2019Updated 6 years ago
- ☆15Aug 31, 2020Updated 5 years ago
- Analyze Android APK files from a browser.☆14Sep 29, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- POC which exploits a vulnerability within Nagios XI (5.6.5) to spawn a root shell☆15Jul 17, 2021Updated 4 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Cybersecurity and Hacking tools made by Python☆13Jan 15, 2022Updated 4 years ago
- Simple way to read wirte delete values from registry☆16Jun 24, 2019Updated 6 years ago
- Scanner for Zyxel products which are potentially vulnerable due to an undocumented user account (CVE-2020-29583)☆15Jan 4, 2021Updated 5 years ago
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- ARP spoof then session jack within your browser☆29Feb 10, 2014Updated 12 years ago
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Mar 11, 2019Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CVE-2018-3191 反弹shell☆16Oct 23, 2018Updated 7 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- Drupal 7.x Services Module Remote Code Execution Exploit - https://www.ambionics.io/blog/drupal-services-module-rce☆14Mar 9, 2017Updated 9 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 7 years ago
- remote administrator framework☆21Aug 9, 2024Updated last year
- WordPress win10exp主题☆33Jul 9, 2021Updated 4 years ago
- Python exploit of cve-2020-7247☆25Feb 19, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- 从github爬取路径然后生成字典用来爆破,针对利用开源github搭建的网站的路径提取☆27Aug 20, 2022Updated 3 years ago
- (Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 – Unauthenticated Arbitrary File Upload☆17May 17, 2019Updated 7 years ago
- This is very basic automated recon script tool.☆19Updated this week
- Exploit Pack - One step ahead☆11Sep 9, 2013Updated 12 years ago
- Here you can find writeups from various CTFs that I've participated in.☆12Jul 30, 2023Updated 2 years ago
- ☆22Oct 22, 2019Updated 6 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆105May 25, 2020Updated 5 years ago
- WordPress <= 5.3.? DoS☆25Dec 17, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆29Oct 18, 2021Updated 4 years ago
- Laravel RCE exploit. CVE-2018-15133☆35Mar 22, 2022Updated 4 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Apr 9, 2019Updated 7 years ago
- A custom script I created because I got tired of installing my tools manually!☆13Nov 19, 2024Updated last year
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆28Oct 30, 2021Updated 4 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Apr 10, 2019Updated 7 years ago
- A repository hosting some of my own vulnerability reports and proof-of-concepts.☆15Aug 8, 2019Updated 6 years ago