superkojiman / vulnerabilitiesLinks
Published vulnerabilities and exploits.
☆57Updated 2 years ago
Alternatives and similar repositories for vulnerabilities
Users that are interested in vulnerabilities are comparing it to the libraries listed below
Sorting:
- PoC implementation of the POODLE attack☆69Updated 10 years ago
- Pentest Scripts for Apache Vulnerabilities☆30Updated 7 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆25Updated 8 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 12 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 8 years ago
- public exploits☆35Updated 2 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Updated 10 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆54Updated 11 years ago
- The Ultimate Guide to Pwning☆59Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- My own tools for easing the task of pentesting / exploit writing☆49Updated 11 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago
- ☆122Updated 7 years ago
- ☆23Updated 8 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- some pocs for antivirus evasion☆131Updated 2 years ago
- A repository of public reports, publications, and presentations associated with research performed by Security Engineers at Security In…☆52Updated 6 years ago
- Automated Exploit generation with WinDBG☆190Updated 9 years ago
- Hacking challenges☆31Updated 8 years ago
- CTF Wiki - http://ctf.forgottensec.com/wiki/index.php☆47Updated 8 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Updated 8 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- PHDAYS |||☆17Updated 12 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Updated 12 years ago
- Babel Scripting Framework☆43Updated 5 years ago
- Simple vulnerability scanning framework☆51Updated 9 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago