exploit-database-papers
☆14Nov 27, 2017Updated 8 years ago
Alternatives and similar repositories for exploit-database-papers
Users that are interested in exploit-database-papers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ( Wordpress Exploit ) Wordpress Multiple themes - Unauthenticated Arbitrary File Upload☆11Feb 9, 2023Updated 3 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Gemini PDA Linux kernel v3.18 (for Debian/SailfishOS) - branch 'native' is built for debian package☆12Nov 24, 2023Updated 2 years ago
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 5 years ago
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 3 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- Material dark syntax theme for Inkdrop Markdown Editor☆12Aug 17, 2022Updated 3 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Scraping creds using Github API and truffleHog☆11Dec 13, 2023Updated 2 years ago
- Working on a small SQL Injection framework☆17Aug 30, 2025Updated 8 months ago
- Sample app showing delegated authentication☆11Jun 4, 2019Updated 6 years ago
- Sample embedded defense code for applications written in .NET, Java, PHP and Python.☆11Feb 23, 2019Updated 7 years ago
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Unpacking tool for the zipExec Crypter☆14Oct 30, 2021Updated 4 years ago
- Simple Tool for webhacking☆10Apr 4, 2023Updated 3 years ago
- Exploit for HEVD☆10Sep 11, 2019Updated 6 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- Platform for a noob hacker to learn hacking on localhost.☆11Oct 14, 2016Updated 9 years ago
- ☆17Feb 4, 2020Updated 6 years ago
- ATM Configurator aka Tyupkin trojan☆11Mar 23, 2015Updated 11 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- Analyzing Rig Exploit Kit☆50May 17, 2017Updated 9 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- ☆10Oct 20, 2025Updated 7 months ago
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- a Modular web penetration testing interface☆15Feb 20, 2026Updated 2 months ago
- Remot Desktop Checker (Au3-Source)☆10Jun 25, 2018Updated 7 years ago
- awesome list of browser exploitation tutorials☆14Sep 21, 2018Updated 7 years ago
- Functions for parsing INI-style file natively in bash☆18Jun 4, 2022Updated 3 years ago
- A windows kernel-mode rootkit with remote control☆11Sep 17, 2022Updated 3 years ago
- ☆13Nov 17, 2012Updated 13 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Shortcut Downloader☆11Jan 11, 2017Updated 9 years ago
- Offensive tool for Active Directory reconnaissance☆12Jan 28, 2026Updated 3 months ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 8 years ago
- Application for logging HTTP and DNS Requests☆15May 14, 2021Updated 5 years ago
- Hide the TCP Connection☆23Mar 24, 2023Updated 3 years ago
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆23Oct 6, 2021Updated 4 years ago