Exploits for some of the vulnerabilities I have discovered
☆19Aug 3, 2020Updated 5 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below
Sorting:
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Dec 5, 2020Updated 5 years ago
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- Just simple helper tool for generate github search link☆18Feb 28, 2021Updated 5 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- ☆15Aug 31, 2020Updated 5 years ago
- Remote persistent keylogger for Windows and Linux..☆12Aug 21, 2022Updated 3 years ago
- Check url is live (*HTTP status code "200 ok" only*).☆15Jun 13, 2020Updated 5 years ago
- Cybersecurity and Hacking tools made by Python☆13Jan 15, 2022Updated 4 years ago
- cve-2019-11931☆35Nov 16, 2019Updated 6 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- Revisiting Helpviewer.app to hack Parallels for Mac☆17Sep 14, 2019Updated 6 years ago
- WordPress win10exp主题☆33Jul 9, 2021Updated 4 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- Scanner for Zyxel products which are potentially vulnerable due to an undocumented user account (CVE-2020-29583)☆16Jan 4, 2021Updated 5 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- Drupal 7.x Services Module Remote Code Execution Exploit - https://www.ambionics.io/blog/drupal-services-module-rce☆14Mar 9, 2017Updated 8 years ago
- Linksys Smart Wi-fi X-JNAP-Action Sensitive Information Disclosure for EA8500 router and potentially others☆21Jun 14, 2021Updated 4 years ago
- PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)☆40Dec 12, 2018Updated 7 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Mar 11, 2019Updated 6 years ago
- Python exploit of cve-2020-7247☆25Feb 19, 2020Updated 6 years ago
- This is very basic automated recon script tool.☆18Jul 14, 2024Updated last year
- Simple way to read wirte delete values from registry☆18Jun 24, 2019Updated 6 years ago
- CVE-2018-3191 反弹shell☆16Oct 23, 2018Updated 7 years ago
- (Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 – Unauthenticated Arbitrary File Upload☆17May 17, 2019Updated 6 years ago
- Tool to test for existence of CVE-2020-8218☆22Sep 5, 2020Updated 5 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Apr 10, 2019Updated 6 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆49Apr 9, 2019Updated 6 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Nov 20, 2022Updated 3 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Jul 24, 2020Updated 5 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- ☆22May 13, 2019Updated 6 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Mar 1, 2019Updated 7 years ago
- CVE-2020-1958 PoC☆22Apr 11, 2020Updated 5 years ago
- remote administrator framework☆22Aug 9, 2024Updated last year
- Experiments on the Windows Internals☆31Sep 22, 2019Updated 6 years ago
- WordPress <= 5.3.? DoS☆24Dec 17, 2019Updated 6 years ago
- Burp Suite extension to help make Graphql request more readable☆33Dec 7, 2017Updated 8 years ago