Exploits and exploit utilities for Pokemon Red and Blue
-
Updated
Aug 11, 2016 - Assembly
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Exploits and exploit utilities for Pokemon Red and Blue
ICS and SCADA tools and exploits
The Router Exploitation Framework
The world's first fully adaptive pentesting framework
EternalRocks , Shadow Brokers Exploits
Decrypted content of eqgrp-auction-file.tar.xz
The Web Exploit Detector is a Node.js application used to detect possible infections, malicious code and suspicious files in web hosting environments
Some lazy but working exploits written, modded or collected by me. But the scope is to write my own exploits and store them in this repository. Of course if I let you see.
A CLI for Exploitalert
A Node-based Exploitalert API
Powerful Shodan API client using RxJava and Retrofit
Created by The cybersecurity community