superkojiman / vulnerabilitiesLinks
Published vulnerabilities and exploits.
☆57Updated 2 years ago
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- XXE OOB Exploitation Toolset for Automation☆63Updated 12 years ago
- PoC implementation of the POODLE attack☆69Updated 10 years ago
- Pentest Scripts for Apache Vulnerabilities☆30Updated 8 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 8 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- public exploits☆35Updated 2 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆54Updated 11 years ago
- Automated Exploit generation with WinDBG☆190Updated 9 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 8 years ago
- ☆96Updated 7 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆25Updated 8 years ago
- Exploits for getting local root on Linux, BSD, AIX, HP-UX, Solaris, RHEL, SUSE etc.☆46Updated 11 years ago
- ☆72Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Hacking challenges☆31Updated 8 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Updated 11 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Updated 8 years ago
- Babel Scripting Framework☆43Updated 5 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆43Updated 12 years ago
- ☆128Updated 9 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Updated 11 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)☆114Updated 9 years ago
- PHDAYS |||☆17Updated 12 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 5 years ago