Some RMI/LDAP servers for exploiting JNDI injections
-
Updated
Mar 7, 2022 - Java
Some RMI/LDAP servers for exploiting JNDI injections
Penetration Tester all CVE Exploitation tool
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
Multi-Architecture GDB Enhanced Features for exploit devs & reversers
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Exploit toolkit for old ip cameras. Inspired by Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker
Linux 2.6.39 Sürümüne Göre Uygun Olan Bir Exploit
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
This is a set of hacking tools written in NodeJS
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
remote exploits, just run, with dorks, and everything
Python - Metasploit-Framework Database Management
dDumper is a Drupal Vulnerability Scanner & an Auto Exploiter.
Shellcode / Buffer Overflow 💣
Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad character identifier, shellcode carver, and a vanilla EIP exploiter
Add a description, image, and links to the exploit-kit topic page so that developers can more easily learn about it.
To associate your repository with the exploit-kit topic, visit your repo's landing page and select "manage topics."