superkojiman / vulnerabilitiesLinks
Published vulnerabilities and exploits.
☆57Updated 2 years ago
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Pentest Scripts for Apache Vulnerabilities☆30Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 8 years ago
- PoC implementation of the POODLE attack☆69Updated 10 years ago
- public exploits☆35Updated 2 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 8 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 8 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago
- ☆94Updated 7 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆76Updated 9 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Updated 10 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆54Updated 11 years ago
- ☆122Updated 7 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- Automated Exploit generation with WinDBG☆191Updated 9 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 12 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆43Updated 12 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- A repository of public reports, publications, and presentations associated with research performed by Security Engineers at Security In…☆52Updated 6 years ago
- A shellcode testing harness.☆70Updated last year
- ☆22Updated 8 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- Hacking challenges☆31Updated 8 years ago
- PHDAYS |||☆17Updated 12 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆102Updated 8 years ago
- Heartbleed (CVE-2014-0160) client exploit☆325Updated 9 years ago
- The Zulu fuzzer☆124Updated 8 years ago
- My own tools for easing the task of pentesting / exploit writing☆49Updated 11 years ago