superkojiman / vulnerabilitiesLinks
Published vulnerabilities and exploits.
☆57Updated 2 years ago
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- Pentest Scripts for Apache Vulnerabilities☆31Updated 7 years ago
- XXE OOB Exploitation Toolset for Automation☆62Updated 11 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated last year
- WhiteBox CMS analysis☆69Updated 2 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 8 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆53Updated 10 years ago
- PoC implementation of the POODLE attack☆68Updated 10 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Updated 10 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 10 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 8 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- some pocs for antivirus evasion☆132Updated 2 years ago
- My own tools for easing the task of pentesting / exploit writing☆50Updated 10 years ago
- public exploits☆35Updated 2 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- A shellcode testing harness.☆70Updated last year
- Spray SMB with hashes, Then psexec☆32Updated 6 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆34Updated 12 years ago
- JavaScript Reversed TCP Meterpreter Stager☆137Updated 8 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Updated 9 years ago
- ☆128Updated 8 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- Simple vulnerability scanning framework☆51Updated 8 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆43Updated 12 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 6 years ago