Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
#

exploits

Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.

Here are 465 public repositories matching this topic...

h4cker

This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security, vulnerability research, exploit development, reverse engineering, and more. 🔥 Also check:https://hackertraining.org

  • UpdatedDec 11, 2025
  • Jupyter Notebook

Community curated list of templates for the nuclei engine to find security vulnerabilities.

  • UpdatedDec 17, 2025
  • JavaScript

Decrypted content of eqgrp-auction-file.tar.xz

  • UpdatedMay 24, 2017
  • Perl

巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。

  • UpdatedApr 16, 2024
  • Python

🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)

  • UpdatedFeb 15, 2023
  • C
SUDO_KILLER

A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.

  • UpdatedOct 3, 2025
  • Shell

vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collection (including sub-domain name, ip address, country information, organizational information and time zone, etc.) and vulnerability scanning.

  • UpdatedJun 7, 2023
  • Python

Nuclei POC,每2小时更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现。已有41w+POC,其中3.5w+高质量POC

  • UpdatedDec 17, 2025
  • Rust

Find exploits in local and online databases instantly

  • UpdatedSep 27, 2021
  • Shell

Miscellaneous exploit code

  • UpdatedOct 6, 2023
  • Python
openclarity

OpenClarity is an open source platform built to enhance security and observability of cloud native applications and infrastructure

  • UpdatedDec 15, 2025
  • Go
deepce

Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)

  • UpdatedFeb 17, 2025
  • Shell

Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.

  • UpdatedJul 5, 2023
  • C++

60k+ WordPress Nuclei templates, updated daily from Wordfence intel—filter by severity/tags/CVE and scan in one line. 🚀🔒

  • UpdatedDec 17, 2025
  • Python

An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction

  • UpdatedDec 2, 2021
  • Python

Created by The cybersecurity community

Followers
361 followers
Website
github.com/topics/exploit
Wikipedia
Wikipedia

Related topics

cybersecurity hacking penetration-testing vulnerability-assessment

[8]ページ先頭

©2009-2025 Movatter.jp