exploit-kit
There are 25 repositories under exploit-kit topic.
jollheef/lpe
collection of verified Linux kernel exploits
miyagaw61/exgdb
Extension for GDB
9aylas/Shortcut-Payload-Generator
AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.
ins1gn1a/Frampton
PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible
rhaym-tech/Exploits
Exploits for iOS 11.4.1-iOS 17.4.1 and android 8.0-15
ins1gn1a/WoollyMammoth
Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad character identifier, shellcode carver, and a vanilla EIP exploiter
yak0d3/anyForm
Anyform is a lightweight form brute-forcing tool.
yak0d3/dDumper
dDumper is a Drupal Vulnerability Scanner & an Auto Exploiter.
sectool/Python-Shellcode-Buffer-Overflow
Shellcode / Buffer Overflow 💣
sectool/Python-Metasploit-Framework-Database-Management
Python - Metasploit-Framework Database Management
non-compliant/DemonHunter-Deobfuscated
Deobfuscated DemonHunter Exploit Kit.
superswan/CamMander
Exploit toolkit for old ip cameras. Inspired by Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker
AdrielFreud/Exploits-kit
remote exploits, just run, with dorks, and everything
shayanzare/obj2shellcode
Objdump to ShellCode
vaginessa/ExploitKit
Exploitkit
USDTC/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
DaggieBlanqx/NodeJS-ExploitKit
This is a set of hacking tools written in NodeJS
TypsSec/WinRAR-Exploit-Builder
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
USDTC/Discord-Image-Logger-Stealer
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
USDTC/PDF-FUD-Exploit
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
USDTC/Slient-URL-Exploit
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
USDTC/HTA-Exploit
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
cansofficall/Linux2.6.39LocalExploit
Linux 2.6.39 Sürümüne Göre Uygun Olan Bir Exploit
FOGSEC/gef
Multi-Architecture GDB Enhanced Features for exploit devs & reversers
nth347/JNDI-injection-servers
Some RMI/LDAP servers for exploiting JNDI injections