ytisf / Exploits
Public exploits (re)writed while learning.
☆10Updated 11 years ago
Alternatives and similar repositories for Exploits:
Users that are interested in Exploits are comparing it to the libraries listed below
- Collection of cracked malware☆14Updated 6 years ago
- A simple Python tool to harvest email addresses from Google.☆15Updated 10 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆28Updated 4 years ago
- Scripts used for phishing campaigns☆14Updated 10 years ago
- Software exploitation training material☆15Updated 7 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆15Updated 8 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 9 years ago
- Share wifi on windows with arranged password like every hour or every day☆15Updated 7 years ago
- SIP hacking tools and scripts☆23Updated 4 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Kill Any Antivirus Using Python For Windows Users .☆45Updated 8 years ago
- MiTM tools and scripts☆19Updated 9 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- python code to connect to mail servers and pillage the data contained within☆9Updated 8 years ago
- Malicious Link Blog☆24Updated last year