ytisf / Exploits
Public exploits (re)writed while learning.
☆10Updated 11 years ago
Related projects ⓘ
Alternatives and complementary repositories for Exploits
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 7 years ago
- A simple Python tool to harvest email addresses from Google.☆14Updated 9 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Collection of cracked malware☆14Updated 5 years ago
- Security Advisories and Researches☆15Updated 10 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 7 years ago
- Scripts and tools for ISM hacking☆15Updated 6 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- SIP hacking tools and scripts☆23Updated 3 years ago
- w3af packaging for Kali distribution☆26Updated 8 years ago
- Pentesting Hacking Tools, Scripts, Windows, Linux,☆28Updated 8 years ago
- 📡 A security research tool with shodan integration☆24Updated 6 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆34Updated 3 years ago
- Metasploit installer for Debian (Jessie) VPS.☆25Updated 7 years ago
- A python tool that will extract exif data from picture with two methods☆37Updated 2 years ago
- Pentest tools for Windows hacking processes☆12Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆35Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated 6 years ago
- A python3 script that uses cl1p website to send and receive secret messages☆27Updated 4 years ago
- Hacking environment installation scripts for OS X☆26Updated 2 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- ARP spoof then session jack within your browser☆27Updated 10 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 9 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- GSM+GPRS Radio Access Network Node☆17Updated 9 years ago
- Port scanning and domain utility.☆29Updated 7 years ago