Public exploits (re)writed while learning.
☆14Aug 7, 2013Updated 12 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple Python tool to harvest email addresses from Google.☆17Jan 8, 2015Updated 11 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆20Aug 6, 2018Updated 7 years ago
- General tools and scripts i want to make public to the world.☆47Apr 14, 2019Updated 7 years ago
- Miscellaneous exploit code☆21Oct 30, 2016Updated 9 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A multi threaded Python script designed to brute force directories and files names on webservers.☆81May 20, 2022Updated 3 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Malicious Software SRC Extract☆31Jan 2, 2023Updated 3 years ago
- Short little AV Test to check Detection Rates☆20Jan 28, 2021Updated 5 years ago
- Customisable PCAP parser and research assistant☆26Jan 8, 2018Updated 8 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Jun 8, 2017Updated 8 years ago
- A suite of polyfills supporting the HTML Web Components specs☆16Oct 1, 2019Updated 6 years ago
- A simple web gui for Transmission☆19Sep 25, 2010Updated 15 years ago
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆10Oct 2, 2021Updated 4 years ago
- A modern utility library for JavaScript/TypeScript.☆12Jan 5, 2023Updated 3 years ago
- Your Friendly Neighbourhood Honeypot Maker and Manager☆33Mar 20, 2019Updated 7 years ago
- control de asistencia de una escuela☆11May 21, 2017Updated 8 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 10 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- A short and small memory forensics helper.☆52Oct 18, 2017Updated 8 years ago
- Manticore Ransomware Emulation - Educational Purpose Only!☆10Aug 2, 2020Updated 5 years ago
- one-time use token phishing toolkit☆12May 30, 2020Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- A place where you can find all emojis provided by GitHub.com☆13Jan 10, 2026Updated 3 months ago
- Block websites with ease!☆12Jan 17, 2026Updated 3 months ago
- Writeups from various CTFs solved with Mathematica☆10Apr 15, 2017Updated 9 years ago
- ☆10Jul 30, 2017Updated 8 years ago
- OG Atomic Red Team☆30Jun 12, 2018Updated 7 years ago
- midfunction d3d basehook for winxp, win7, win8, win10☆17Jan 21, 2019Updated 7 years ago
- Windows inject☆17Jun 7, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Detect if running in a VM or on real hardware☆14Aug 23, 2014Updated 11 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 9 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- A simple Mac-Address Sniffer based on tshark☆12Dec 27, 2018Updated 7 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- ☆15Dec 3, 2020Updated 5 years ago
- Assembly code to use for Windows kernel shellcode to edit winlogon.exe ACL☆13Mar 6, 2017Updated 9 years ago