ytisf / ExploitsLinks
Public exploits (re)writed while learning.
☆14Updated 12 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- Miscellaneous exploit code☆21Updated 9 years ago
- Samsung TV Denial of Service (DoS) Attack☆36Updated 9 years ago
- A simple Python tool to harvest email addresses from Google.☆17Updated 11 years ago
- Archive of leaked Equation Group materials☆16Updated 9 years ago
- Malicious Software SRC Extract☆32Updated 3 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 10 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆20Updated 8 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆51Updated 8 years ago
- python remote access trojan☆38Updated 8 years ago
- PoC Android smart phone botnet☆79Updated 13 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆37Updated 10 years ago
- Android remote administration client☆11Updated 7 years ago
- A python tool that will extract exif data from picture with two methods☆38Updated 4 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆31Updated 5 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 10 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Updated 9 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- Software exploitation training material☆16Updated 8 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Updated 9 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- HTTP botnet☆62Updated 9 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆37Updated 12 years ago
- Social Engineering Toys☆36Updated 9 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 9 years ago
- Brand New Code Injection for Windows☆13Updated 9 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 8 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 12 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Password cracking utility☆54Updated 4 years ago