collection of verified Linux kernel exploits
-
Updated
Dec 16, 2020 - C
collection of verified Linux kernel exploits
Extension for GDB
AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.
PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible
Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad character identifier, shellcode carver, and a vanilla EIP exploiter
Anyform is a lightweight form brute-forcing tool.
dDumper is a Drupal Vulnerability Scanner & an Auto Exploiter.
Shellcode / Buffer Overflow 💣
Python - Metasploit-Framework Database Management
Exploit toolkit for old ip cameras. Inspired by Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
remote exploits, just run, with dorks, and everything
This is a set of hacking tools written in NodeJS
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
Linux 2.6.39 Sürümüne Göre Uygun Olan Bir Exploit
Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.
Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.
Add a description, image, and links to the exploit-kit topic page so that developers can more easily learn about it.
To associate your repository with the exploit-kit topic, visit your repo's landing page and select "manage topics."