In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
-
Updated
Jun 2, 2024 - C++
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Hourly updated database of exploit and exploitation reports
This is an aspiring project aimed at accumulating knowledge from the world of cybersecurity and presenting it in a cogent way, so it is accessible to as large an audience as possible and so that everyone has a good resource to learn hacking from.
Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
UNIX-like reverse engineering framework and command-line toolset.
Ai000-Rostam (Codename: Ritchie Blackmoore) is a penetration testing tool for windows infrastructure that has been developing by Ai000 Cybernetic QLab as an offensive research project. It can be used in the red-teaming projects and penetration testing of an active directory-based environment.
An official book about Rizin
🔐 Run frida-server on boot with Magisk, always up-to-date
Automatic SSRF fuzzer and exploitation tool
Exploitation and Mitigation Slides
Cybersecurity oriented awesome list
Automated All-in-One OS Command Injection Exploitation Tool.
An List of my own Powershell scripts, commands and Blogs for windows Red Teaming.
This is an environment for linux kernel exploitation.
linWinPwn is a bash script that streamlines the use of a number of Active Directory tools
PwnAnalyzer is a Python-based exploitation detection tool designed to scan log files for patterns indicative of known vulnerabilities or exploitation attempts. It uses a configurable template system to define patterns, severity levels, and actions to take upon detecting matches.
Add a description, image, and links to the exploitation topic page so that developers can more easily learn about it.
To associate your repository with the exploitation topic, visit your repo's landing page and select "manage topics."