superkojiman / vulnerabilities
Published vulnerabilities and exploits.
☆55Updated last year
Alternatives and similar repositories for vulnerabilities:
Users that are interested in vulnerabilities are comparing it to the libraries listed below
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- Public exploits (re)writed while learning.☆59Updated 11 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 7 years ago
- Hacking challenges☆32Updated 7 years ago
- ☆70Updated 7 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- ☆21Updated 8 years ago
- WhiteBox CMS analysis☆69Updated last year
- The Zulu fuzzer☆125Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆44Updated 11 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 4 years ago
- Pentest Scripts for Apache Vulnerabilities☆31Updated 7 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 7 years ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆52Updated 10 years ago
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆103Updated 6 years ago
- The Outlook HTML Leak Test Project☆132Updated 6 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated 7 months ago
- ☆122Updated 6 years ago
- Tools used for Penetration testing / Red Teaming☆64Updated 6 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- PoC implementation of the POODLE attack☆69Updated 9 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- XSS Payloads☆49Updated 9 years ago
- public exploits☆35Updated last year
- Exploits for CVE-2017-6008, a kernel pool buffer overflow leading to privilege escalation.☆116Updated 3 months ago