There are 135 repositories under exploits topic.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
Exploitation Framework for Embedded Devices
Community curated list of templates for the nuclei engine to find security vulnerabilities.
Linux privilege escalation auditing tool
A list of resources in different fields of Computer Science
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collection (including sub-domain name, ip address, country information, organizational information and time zone, etc.) and vulnerability scanning.
Find exploits in local and online databases instantly
Miscellaneous exploit code
针对SpringBoot的开源渗透框架,以及Spring相关高危漏洞利用工具
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
A Ruby framework designed to aid in the penetration testing of WordPress systems.
The Correlated CVE Vulnerability And Threat Intelligence Database API
scalpel是一款命令行漏洞扫描工具,支持深度参数注入,拥有一个强大的数据解析和变异算法,可以将常见的数据格式(json, xml, form等)解析为树结构,然后根据poc中的规则,对树进行变异,包括对叶子节点和树结构 的变异。变异完成之后,将树结构还原为原始的数据格式。
Repository for information about 0-days exploited in-the-wild.
You just found a hidden gem 💎 This repo contains a massive amount (10,000+) of WordPress related Nuclei templates. Updated daily!
A collection of android Exploits and Hacks
Exploit allowing you to read registry hives as non-admin on Windows 10 and 11
kernel privilege escalation enumeration and exploitation framework
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
A collection of curated Java Deserialization Exploits