Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.
☆61May 11, 2015Updated 10 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆39Feb 21, 2016Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Small modification version of p0wnedShell☆40Apr 25, 2016Updated 9 years ago
- ☆26May 7, 2016Updated 9 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Aug 12, 2015Updated 10 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- A USB RUBBER DUCKY GUI! A RoR app as a simple GUI wrapper for the Duck Encoder. Have it configured to serve remotely and you have a way o…☆30Dec 11, 2014Updated 11 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Collection of scanner checks missing in Burp☆15Apr 22, 2022Updated 3 years ago
- HackRF / RTLSDR Spectrum Scanning Interface (WIP)☆29Aug 18, 2016Updated 9 years ago
- MS15-076 Privilege Escalation☆101Sep 21, 2015Updated 10 years ago
- Initial Collection of HackingTeam Exploits☆93Jul 7, 2015Updated 10 years ago
- Extract unencrypted SSH keys from pageant memory dump☆15Oct 3, 2015Updated 10 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- Exploits and research stuffs☆54Jan 19, 2026Updated 2 months ago
- CTF write-ups 2015☆19Jun 27, 2023Updated 2 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- Vulnerability research and development.☆25Jul 22, 2015Updated 10 years ago
- Demo of how to create binaries with a colliding MD5☆33Feb 27, 2017Updated 9 years ago
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- ☆12Jun 13, 2016Updated 9 years ago
- A pure-python win32 debugger interface.☆28Jan 10, 2016Updated 10 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- A smali emulator.☆24Jun 27, 2018Updated 7 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtection☆90Jun 19, 2015Updated 10 years ago
- NASM Standard Library for shellcode☆69Aug 4, 2016Updated 9 years ago
- Shodan HQ nmap plugin - passively scan targets☆157Mar 14, 2016Updated 10 years ago
- A tool to generate a custom code signing certificate chain and generate instructions to sign a binary. Useful for establishing persistenc…☆115Apr 16, 2016Updated 9 years ago
- ☆139Jul 13, 2017Updated 8 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- ☆96Jul 10, 2018Updated 7 years ago
- Proof-of-Concept code for exploits☆82May 5, 2016Updated 9 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Jan 8, 2017Updated 9 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago