An archive of 0day.today exploits
☆356Jul 25, 2025Updated 9 months ago
Alternatives and similar repositories for 0day.today.archive
Users that are interested in 0day.today.archive are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This vulnerability could allow an attacker to take complete control of a vulnerable Confluence server. This could allow the attacker to s…☆11May 24, 2024Updated last year
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 9 months ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆26Apr 30, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Go-based Exploit Framework☆426Apr 20, 2026Updated last week
- ☆39Jul 31, 2025Updated 9 months ago
- Command and Control Framework using powershell implants☆36Jun 17, 2025Updated 10 months ago
- Offensive V Programming☆18Nov 3, 2021Updated 4 years ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆45Apr 21, 2025Updated last year
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆43Apr 3, 2026Updated 3 weeks ago
- Verizon Burp Extensions: AI Suite☆142Apr 22, 2025Updated last year
- ☆18Feb 2, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆149Jun 9, 2025Updated 10 months ago
- Group Policy Objects manipulation and exploitation framework☆300Dec 7, 2025Updated 4 months ago
- Red Team Coin for crypto-mining operations.☆24Mar 1, 2026Updated last month
- CVE-2024-30056 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability☆17May 27, 2024Updated last year
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,074Mar 10, 2026Updated last month
- Mapping of open-source detection rules and atomic tests.☆208Feb 16, 2026Updated 2 months ago
- ☆165Jun 12, 2025Updated 10 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆38Sep 25, 2024Updated last year
- A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and …☆335Mar 6, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Windows AppLocker Driver (appid.sys) LPE☆76Jul 29, 2024Updated last year
- Security tool against dependency typosquatting attacks☆55Apr 21, 2026Updated last week
- Cross-Site Scripting (XSS) is a common vulnerability that allows attackers to inject malicious scripts into web pages viewed by users. In…☆11Sep 10, 2024Updated last year
- A little tool to filter the stranger strings from a binary so you can analyze the good ones☆54Sep 11, 2025Updated 7 months ago
- ☆156Apr 23, 2025Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Jul 9, 2023Updated 2 years ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆342Updated this week
- Fast, zero-dependency credential testing tool in Go. Brute force SSH, MySQL, PostgreSQL, Redis, MongoDB, SMB, and 20+ protocols. Hydra al…☆228Updated this week
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆450May 24, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆27May 21, 2024Updated last year
- Daily C2 threat intelligence feed☆19Apr 13, 2026Updated 2 weeks ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- CVE-2025-6218 is a directory traversal vulnerability in WinRAR that allows an attacker to place files outside the intended extraction dir…☆17Jul 10, 2025Updated 9 months ago
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- VulnSeer combines the power of Nmap's service detection with multiple AI providers to deliver intelligent vulnerability assessments. Unli…☆43Jun 12, 2025Updated 10 months ago
- Code and Website For PatchThis.app☆32Updated this week