A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
-
Updated
May 28, 2024 - C++
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
A symbolic execution engine for EVM smart contract binaries.
Universal Open Source Aimbot
Community curated list of templates for the nuclei engine to find security vulnerabilities.
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
A Go-based Exploit Framework
CTFs solve scripts
out-of-tree kernel {module, exploit} development tool
Educational Exploit for CVE-2022-30190 (Follina)
RevEng.AI Toolkit and Python API
A Ruby micro-framework for writing and running exploits
Modular penetration testing platform that enables you to write, test, and execute exploit code.
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.
This repository contains multiple exploits I have written for various CVEs and CTFs
Add a description, image, and links to the exploit-development topic page so that developers can more easily learn about it.
To associate your repository with the exploit-development topic, visit your repo's landing page and select "manage topics."