Hourly updated database of exploit and exploitation reports
-
Updated
Jun 26, 2024 - Python
Hourly updated database of exploit and exploitation reports
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
Automatic SQL injection and database takeover tool
Cybersecurity oriented awesome list
Automated All-in-One OS Command Injection Exploitation Tool.
UNIX-like reverse engineering framework and command-line toolset.
Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
DarkStar is a Premium Hacking Tools. You can buy by contacting me
CTF quiz challenge: Exploiting a Vulnerable Calculator Web App.
Honeyscanner: A vulnerability analyzer for honeypots
A number of exploits and tools I've written for CVEs accredited to Marshall Whittaker/oxagast
The code repository for the Snake&Apple article series.
Local File Inclusion discovery and exploitation tool
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Vulnerability details and exploit for CVE-2021-3754
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."