exploits
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Here are 405 public repositories matching this topic...
The world's first fully adaptive pentesting framework
-
Updated
May 18, 2017
Versión Dr. DLL (CVE-2018-18333)
-
Updated
Aug 28, 2022 - Python
Implementation of multi-armed bandit problem with greedy and ɛ-greedy action selection algorithms.
-
Updated
May 12, 2021 - Python
Hook DnsQueryEX to control domains resolving in any application using dnsapi.dll
-
Updated
Oct 19, 2021 - C++
This project is intended to create a github version of search functions for exploits through Criminal IP.
-
Updated
Feb 9, 2023 - Python
Code that I have written/modified in multiple programming languages .
-
Updated
Nov 21, 2020 - Python
Custom templates I wrote for the Nuclei vuln scanner.
-
Updated
Jun 25, 2023
A repository of PoCs for ronin-exploits
-
Updated
May 28, 2024 - Ruby
My solutions to ropemporium challenges
-
Updated
Feb 7, 2018 - Python
Find exploits in local and online databases instantly ; Same as the original, but usable and constantly up-to-date
-
Updated
Oct 28, 2018 - Shell
Config files for my GitHub profile.
-
Updated
Jul 8, 2023
A repository of example ronin exploits
-
Updated
Jun 12, 2023 - Ruby
Scan files, exploits and other informations on the boxes in the HTB.
-
Updated
Aug 19, 2021
Created by The cybersecurity community
- Followers
- 269 followers
- Wikipedia
- Wikipedia