☆35Aug 20, 2019Updated 6 years ago
Alternatives and similar repositories for exploits
Users that are interested in exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- QEMU escape code☆65Jun 6, 2021Updated 4 years ago
- 使用JS监听获取dz密码☆12Sep 5, 2017Updated 8 years ago
- LibVMI in MiniOS☆12May 22, 2021Updated 4 years ago
- pysap SAPMS+SAPRFC patches for Gateway / MS research☆11Apr 30, 2019Updated 6 years ago
- ☆287Apr 23, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A central place to store statically compiled tools I use when auditing a Linux based device.☆14Sep 28, 2020Updated 5 years ago
- CVE-2020-3992 & CVE-2019-5544☆68Feb 5, 2021Updated 5 years ago
- Extract OLEv1 objects from RTF files by instrumenting Word☆50Nov 19, 2019Updated 6 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago
- (unofficial) Hyper-V® Development Kit☆244Feb 20, 2024Updated 2 years ago
- Another kernel self protection☆62May 12, 2020Updated 5 years ago
- ☆13Nov 10, 2020Updated 5 years ago
- Packer and vagrant scripts to automate building Windows and Linux machines on vCenter☆17Jul 7, 2019Updated 6 years ago
- automated penetration toolkit☆12Jul 9, 2016Updated 9 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆22Oct 18, 2021Updated 4 years ago
- ☆135Dec 15, 2019Updated 6 years ago
- QuickPatch: A patching tool☆13Oct 20, 2019Updated 6 years ago
- My fuzzing workshop from PHDays9☆26May 24, 2019Updated 6 years ago
- Stateless Network Fuzzer for QEMU (Targeting SLiRP)☆17Oct 19, 2020Updated 5 years ago
- VMI on BitVisor to detect hidden rootkits.☆27Dec 19, 2016Updated 9 years ago
- ☆15Apr 3, 2022Updated 3 years ago
- ☆51Sep 7, 2017Updated 8 years ago
- Build docker container for @MaskRay's pcap-search☆10Aug 2, 2018Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- 基于nsjail的CTF竞赛Docker环境☆24Jul 30, 2018Updated 7 years ago
- CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code☆37Sep 8, 2020Updated 5 years ago
- ☆16Jun 23, 2024Updated last year
- ☆26Dec 17, 2021Updated 4 years ago
- Solana Dex Info for arbitrage bot☆18Sep 6, 2025Updated 6 months ago
- PoC for CVE-2021-3492 used at Pwn2Own 2021☆43Aug 3, 2021Updated 4 years ago
- ☆14Sep 26, 2021Updated 4 years ago
- linux kernel LPE using hw_breakpoint attack tech demo☆26Mar 24, 2023Updated 3 years ago
- Exploits, Exploits, Exploits and more Exploits!☆34Nov 7, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆11Oct 23, 2019Updated 6 years ago
- Материалы к статье "Препарируем Hyper V"☆14Nov 5, 2014Updated 11 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆445Apr 11, 2025Updated 11 months ago
- Remote process dumping automation. Use it to dump Windows credentials remotely and extract clear text with Mimikatz offline☆35Jan 3, 2020Updated 6 years ago
- My-CTF-Challenges☆15Sep 27, 2021Updated 4 years ago
- Hyper-V scripts☆139Nov 22, 2025Updated 4 months ago
- Maintain Windows Persistence with an evil Netshell Helper DLL☆12Jul 28, 2018Updated 7 years ago