Just some exploits :P
☆47Jan 18, 2021Updated 5 years ago
Alternatives and similar repositories for exploit
Users that are interested in exploit are comparing it to the libraries listed below
Sorting:
- Some random exploits that may or may not be useful. Not responsible for misuse.☆21Dec 12, 2018Updated 7 years ago
- Changes for Visual Studio 2013☆119Jun 22, 2015Updated 10 years ago
- Exploits a stack buffer overflow in AT-TFTP v1.9, by sending a request (get/write) for an overly long file name.☆11Jun 22, 2015Updated 10 years ago
- pentest tools☆41Sep 4, 2017Updated 8 years ago
- IronBee Rules☆18Dec 4, 2013Updated 12 years ago
- HP Power Manager 'formExportDataLogs' Buffer Overflow☆22Aug 13, 2017Updated 8 years ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- Python tool to bruteforce openssl ciphers against a wordilst☆31Jul 20, 2018Updated 7 years ago
- Various code snippets☆280Feb 8, 2026Updated last month
- ProFTPD IAC Remote Root Exploit☆37Aug 13, 2017Updated 8 years ago
- offsec batteries included☆1,605Mar 11, 2024Updated 2 years ago
- ☆139May 17, 2017Updated 8 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- Repository for python exploits☆73Jan 26, 2021Updated 5 years ago
- Own collection dictionary☆14Apr 20, 2020Updated 5 years ago
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- Some exploits, which I’ve created during my OSCE preparation.☆82Jul 7, 2018Updated 7 years ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated 2 months ago
- xdebug reverse shell☆22Jan 18, 2018Updated 8 years ago
- Collection of different exploits☆184Nov 17, 2020Updated 5 years ago
- Exploits developped by Outflank B.V. team members☆21Jan 26, 2017Updated 9 years ago
- 利用pyautogui实现对炒股软件大智慧里的PDF数据集进行自动下载☆11Sep 10, 2016Updated 9 years ago
- A curated list of digital forensic tools.☆21Dec 2, 2019Updated 6 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆12Apr 22, 2018Updated 7 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Jul 9, 2020Updated 5 years ago
- pwk notes and scripts☆14Apr 29, 2015Updated 10 years ago
- CVE-2007-2447 - Samba usermap script☆62Aug 16, 2020Updated 5 years ago
- CVE-2020-8515-PoC☆14Mar 30, 2020Updated 5 years ago
- Python Script To Brute Force Rar archive files☆10Oct 27, 2019Updated 6 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆43Nov 2, 2020Updated 5 years ago
- Twitter Words of Interest - Generate word lists from twitter searches☆31Nov 10, 2022Updated 3 years ago
- ☆18Aug 15, 2025Updated 7 months ago
- ☆1,395Apr 25, 2021Updated 4 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆49May 29, 2015Updated 10 years ago
- Growatt Solar Inverter Modbus TCP integration for Home Assistant☆25Updated this week
- ☆23Apr 23, 2024Updated last year
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,353Dec 24, 2023Updated 2 years ago
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆29Oct 18, 2021Updated 4 years ago