exploit-database-papers
☆14Nov 27, 2017Updated 8 years ago
Alternatives and similar repositories for exploit-database-papers
Users that are interested in exploit-database-papers are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Some of the vulnerabilities that were found by Cybellum platform☆34Apr 1, 2018Updated 8 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Gemini PDA Linux kernel v3.18 (for Debian/SailfishOS) - branch 'native' is built for debian package☆12Nov 24, 2023Updated 2 years ago
- Personal vim configuration files including setup file.☆15Sep 3, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A dll injector static library for Win x64 processes with handle elevation supported☆12Mar 28, 2021Updated 5 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- ☆17Mar 24, 2026Updated last month
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 3 years ago
- ☆10Jun 9, 2021Updated 4 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 7 years ago
- Laravel PhpUnit Rce And Get Env Exploiter☆24Jun 30, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Material dark syntax theme for Inkdrop Markdown Editor☆12Aug 17, 2022Updated 3 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- Working on a small SQL Injection framework☆17Aug 30, 2025Updated 7 months ago
- Sample embedded defense code for applications written in .NET, Java, PHP and Python.☆11Feb 23, 2019Updated 7 years ago
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- IIS PUT WebDAV GetShell Exploit☆18Aug 15, 2020Updated 5 years ago
- Exploit for HEVD☆10Sep 11, 2019Updated 6 years ago
- Simple Tool for webhacking☆12Apr 4, 2023Updated 3 years ago
- ☆20Mar 9, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Platform for a noob hacker to learn hacking on localhost.☆11Oct 14, 2016Updated 9 years ago
- ☆17Feb 4, 2020Updated 6 years ago
- ATM Configurator aka Tyupkin trojan☆11Mar 23, 2015Updated 11 years ago
- This is a paper list for new hardware database systems especially for gpu.☆17Jun 2, 2024Updated last year
- Hunt the windows Registry automatically using VQL☆15Apr 21, 2026Updated last week
- Reinforcement Learning (RL) is believe to be a more general approach towards Artificial Intelligence (AI). RL is the foundation for many …☆13Dec 22, 2022Updated 3 years ago
- Evil mouse sideways 8 paper weight's☆10Jul 10, 2024Updated last year
- 中华人民共和国民事诉讼法☆19Sep 10, 2014Updated 11 years ago
- a Modular web penetration testing interface☆15Feb 20, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Inspire by Samy Kamkar's "DiffBits" software, except this is written in Python, not Perl.☆14Jul 28, 2021Updated 4 years ago
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- awesome list of browser exploitation tutorials☆14Sep 21, 2018Updated 7 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- Common Wordlists☆58Aug 26, 2016Updated 9 years ago
- ☆13Nov 17, 2012Updated 13 years ago
- Collections of Quark Script that detect vulnerabilities in the binaries.☆21Aug 31, 2025Updated 7 months ago