Exploit
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Here are 2,273 public repositories matching this topic...
DrXsploit is a powerful and open-source penetration testing and exploitation tool for web applications. This tool is designed to automate the process of discovering and exploiting vulnerabilities, saving time and effort for security researchers.
-
Updated
Jun 11, 2024 - Python
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
-
Updated
Jun 11, 2024 - C++
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
-
Updated
Jun 11, 2024 - C#
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
-
Updated
Jun 11, 2024 - C#
Hourly updated database of exploit and exploitation reports
-
Updated
Jun 11, 2024 - Python
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
-
Updated
Jun 11, 2024 - C++
Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
-
Updated
Jun 11, 2024
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
-
Updated
Jun 11, 2024 - C#
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
-
Updated
Jun 11, 2024 - C++
聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or Exp from Github by CVE ID.
-
Updated
Jun 11, 2024 - Python
📡 PoC auto collect from GitHub.
-
Updated
Jun 11, 2024
Framework for rapid development of offensive security tools
-
Updated
Jun 11, 2024 - Perl
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
-
Updated
Jun 11, 2024 - Shell
Gather and update all available and newest CVEs with their PoC.
-
Updated
Jun 11, 2024 - HTML
Crashes iOS 17 Devices using a really any device
-
Updated
Jun 11, 2024 - Python
Kubernetes Attack Graph
-
Updated
Jun 11, 2024 - Go
-
Updated
Jun 11, 2024
System Spoofer designed to evade Roblox bans, spoofs your HWID, Baseboard, MAC & Disk.
-
Updated
Jun 11, 2024 - C++
Created by The cybersecurity community
- Followers
- 269 followers
- Wikipedia
- Wikipedia