ytisf / Exploits
Public exploits (re)writed while learning.
☆11Updated 11 years ago
Alternatives and similar repositories for Exploits:
Users that are interested in Exploits are comparing it to the libraries listed below
- A simple Python tool to harvest email addresses from Google.☆15Updated 10 years ago
- SIP hacking tools and scripts☆23Updated 4 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 9 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Optional plugins for MITMf☆15Updated 10 years ago
- Automatically exported from code.google.com/p/yapscan☆11Updated 9 years ago
- Note:- Run this Script in root user.☆16Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Framework for Making Environmental Keyed Payloads☆12Updated 8 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 6 years ago
- Software exploitation training material☆15Updated 7 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Mobile phone PWN tools and scripts☆14Updated 4 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Social Engineering Framework is a framework to hack mind and sniff and exploit and many features more☆18Updated 7 years ago
- Generate customized and undetectable exploits for Metasploit.☆23Updated 7 years ago
- Open-source Exploiting Framework☆29Updated 7 years ago
- XSS payload designed to steal LastPass users' credentials☆17Updated 10 years ago
- ☆11Updated 10 years ago
- Security Advisories and Researches☆16Updated 10 years ago
- Tool for performing lots of DNS queries quickly☆18Updated 9 years ago
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- Archive of leaked Equation Group materials☆15Updated 8 years ago
- AES encrypted python backdoor that communicates AES encrypted data☆10Updated 10 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆15Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago