There are 5 repositories under exploiting topic.
Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.
A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩
Exploiting challenges in Linux and Windows
C-shellcode to hex converter, handy tool for paste & execute shellcodes in IDA PRO, gdb, windbg, radare2, ollydbg, x64dbg, immunity debugger & 010 editor
Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs
Data+code for NFT launch guide blogpost.
Challenges and vulnerabilities exploitation.
Uncategorized utilities
Improper Authorization Vulnerability in Confluence Data Center and Server + bonus 🔥
With xshellex you can paste any kind of c-shellcode strings in x64dbg, ollydbg & immunity debugger
Hacking training websites list and tutorials
CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools, Network Security, Privilege escalation, Exploiting, Reversing, Secure Code, Bug Bounty, ...
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
Universal Open Source Aimbot
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
A Roblox script that aims to accurately simulate the 2016 Roblox client.
Premium Roblox Script Hub
Insecure Java Deserialization Lab
Borpheus Is A Multi Cyber-Security Tool (Scanning, Payload Building, Exploiting).
An awesome Roblox Exploit for Roblox
👻 SYSTEMatic: Systematically Seizing SYSTEM Rights. Token Impersonation POC. Alternative to PSExec for token theft. From Administrator to NT Authority\SYSTEM.
The only free level 7 keyless ROBLOX exploit with a (soon to be) Custom API.
A dynamic UI Library for ROBLOX Experiences. Made in the style of the original Turtle Spy!
I suck at scripting.