exploiting
Here are 70 public repositories matching this topic...
Language:All
Sort:Most stars
Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.
- Updated
Sep 17, 2024 - Python
A python based tool for exploiting and managing Android devices via ADB
- Updated
Mar 12, 2023 - Python
A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩
- Updated
Oct 17, 2025
WindUI is a open source UI library for Roblox Script Hubs
- Updated
Dec 18, 2025 - Lua
Exploiting challenges in Linux and Windows
- Updated
Dec 22, 2019 - Python
C-shellcode to hex converter, handy tool for paste & execute shellcodes in IDA PRO, gdb, windbg, radare2, ollydbg, x64dbg, immunity debugger & 010 editor
- Updated
Aug 11, 2023 - C
Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs
- Updated
Jan 20, 2024
Framework for exploiting local vulnerabilities
- Updated
Nov 18, 2023 - Python
Data+code for NFT launch guide blogpost.
- Updated
Oct 13, 2021 - Jupyter Notebook
Challenges and vulnerabilities exploitation.
- Updated
Dec 26, 2020 - Python
Improper Authorization Vulnerability in Confluence Data Center and Server
- Updated
Nov 15, 2023 - Python
Kernel Mode DLL Manual Mapper
- Updated
Nov 2, 2024 - C++
With xshellex you can paste any kind of c-shellcode strings in x64dbg, ollydbg & immunity debugger
- Updated
Aug 11, 2023 - C
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
- Updated
Dec 27, 2022 - HTML
Hacking training websites list and tutorials
- Updated
May 6, 2025 - HTML
CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools, Network Security, Privilege escalation, Exploiting, Reversing, Secure Code, Bug Bounty, ...
- Updated
Feb 22, 2023
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
- Updated
Jan 22, 2023 - HTML
Improve this page
Add a description, image, and links to theexploiting topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with theexploiting topic, visit your repo's landing page and select "manage topics."