An open API service providing repository metadata for many open source software ecosystems.

GitHub topics: exploit-development

Elitamz/Cobalt-Strike-csload-plugin

A Cobalt Strike shellcode loader that bypasses mainstream domestic antivirus software.

Language: C# - Size: 91.8 KB - Last synced at: about 3 hours ago - Pushed at: about 4 hours ago - Stars: 0 - Forks: 0

kraaakilo/cybertools

Tools & resources for red teaming, AD, reverse engineering, exploit development

Language: JavaScript - Size: 333 KB - Last synced at: about 11 hours ago - Pushed at: about 16 hours ago - Stars: 0 - Forks: 0

mallahashok9239/Red-Team-Scaner-V2

πŸ›‘ Automate reconnaissance and analysis with RedTeam Scanner v2, featuring essential tools for efficient pentesting and Red Team operations.

Language: Shell - Size: 325 KB - Last synced at: about 16 hours ago - Pushed at: about 16 hours ago - Stars: 0 - Forks: 0

projectdiscovery/nuclei-templates

Community curated list of templates for the nuclei engine to find security vulnerabilities.

Language: JavaScript - Size: 367 MB - Last synced at: about 17 hours ago - Pushed at: about 18 hours ago - Stars: 11,602 - Forks: 3,212

enzoplaaygamemg12/gtfobinSUID

πŸ” Automate SUID/SGID binary enumeration with gtfobinSUID, easily identify vulnerabilities using GTFOBins database. Works offline and across platforms.

Language: Python - Size: 9.13 MB - Last synced at: about 19 hours ago - Pushed at: about 20 hours ago - Stars: 0 - Forks: 0

diba7star/DeHeisenbug

The deterministic heap groomer for C/C++ memory debugging.

Language: C - Size: 11.7 KB - Last synced at: about 18 hours ago - Pushed at: about 21 hours ago - Stars: 0 - Forks: 0

DeadFox55YZ/ShadowSploit

πŸ›‘οΈ Enhance security testing with ShadowSploit, a powerful tool for discovering and exploiting vulnerabilities in web applications efficiently.

Language: Python - Size: 3.91 KB - Last synced at: about 21 hours ago - Pushed at: about 21 hours ago - Stars: 0 - Forks: 0

Lyrox999/SetupHijack

πŸ” Exploit race conditions in Windows installers to elevate privileges by hijacking file drops without needing elevated permissions.

Language: C++ - Size: 2.59 MB - Last synced at: about 21 hours ago - Pushed at: about 22 hours ago - Stars: 0 - Forks: 0

z0mb13w4r/objtools

These tools were originally designed to be a research project and drop-in replacement for readelf, objcopy and objdump utilising Capstone disassembly framework.

Language: C - Size: 1.48 MB - Last synced at: 1 day ago - Pushed at: 1 day ago - Stars: 0 - Forks: 0

prateek123s/HWBP-DEP-Bypass

πŸ›‘οΈ Bypass DEP/NX protection on Windows x64 using hardware breakpoints and instruction emulation to execute code from non-executable memory.

Language: C - Size: 1.33 MB - Last synced at: 1 day ago - Pushed at: 2 days ago - Stars: 0 - Forks: 0

egckode/running-qix-malware

🚨 Explore how compromised NPM packages can infiltrate apps and learn to stop them using real-world examples like `is-arrayish`.

Size: 1.55 MB - Last synced at: 2 days ago - Pushed at: 2 days ago - Stars: 0 - Forks: 0

RevEngAI/plugin-ida

RevEng.AI IDA Pro Plugin

Language: Python - Size: 9.07 MB - Last synced at: 2 days ago - Pushed at: 2 days ago - Stars: 121 - Forks: 10

kal21k/HWBP-DEP-Bypass

πŸš€ Demonstrate code execution from non-executable memory on Windows x64 by bypassing DEP/NX protection using hardware breakpoints and instruction emulation.

Language: C - Size: 1.32 MB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 0 - Forks: 0

Aviwe45/metasploit-for-beginners

πŸ” Master Metasploit with this beginner-friendly course that covers installation, module usage, and effective penetration testing techniques.

Size: 1.32 MB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 0 - Forks: 0

LagZeroCode/HackWire

πŸ”§ Streamline your hacking workflow with HackWire, a powerful tool for efficient code management and collaboration in software development.

Language: JavaScript - Size: 1.29 MB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 0 - Forks: 0

Krizx6/IntrudeLab

πŸ› οΈ Build and automate powerful security tools for effective network intrusion detection and response with IntrudeLab.

Language: Java - Size: 1.29 MB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 0 - Forks: 0

fhgggggggggggggggggggg/IntrudeLab

πŸ›‘οΈ Enhance security awareness with IntrudeLab, a powerful tool for detecting and managing intrusions in your network efficiently.

Language: Java - Size: 3.91 KB - Last synced at: 3 days ago - Pushed at: 3 days ago - Stars: 0 - Forks: 0

Ahegaho/ExploitMaze

πŸš€ Discover and navigate security vulnerabilities in software with ExploitMaze, your tool for efficient and effective exploitation analysis.

Language: C# - Size: 1.29 MB - Last synced at: 3 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

fromgabyaaye/UniPwn

πŸ€– Analyze and exploit command injection vulnerabilities in Unitree robots using BLE, enhancing cybersecurity and providing proof of concept for effective defense.

Language: Python - Size: 9.83 MB - Last synced at: 3 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

Abhishek-innovation/ShadowSploit

πŸ•΅οΈβ™‚οΈ Automate your vulnerability assessment with ShadowSploit, a powerful tool for penetrating testing and enhancing cybersecurity measures.

Language: JavaScript - Size: 1.29 MB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 0 - Forks: 0

MAKAKUU/GenX

GenX is a extension that provides a modern AI UI and developer studio for working with local and cloud-based backend projects.

Language: Svelte - Size: 163 KB - Last synced at: 4 days ago - Pushed at: 4 days ago - Stars: 1 - Forks: 0

RevEngAI/plugin-ghidra

RevEng.AI Ghidra Plugin

Language: Java - Size: 12.9 MB - Last synced at: 2 days ago - Pushed at: 3 days ago - Stars: 142 - Forks: 18

lizxyyyc/sc-reentrancy-attack

πŸ” Analyze and exploit cross-function reentrancy vulnerabilities in smart contracts to enhance security and prevent critical risks.

Language: C++ - Size: 1.36 MB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 0 - Forks: 0

DUVALL707/ExploitMaze

🧩 Navigate and assess vulnerabilities in software systems with ExploitMaze to enhance security and improve defenses against potential threats.

Language: HTML - Size: 1.29 MB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 0 - Forks: 0

vulncheck-oss/go-exploit

A Go-based Exploit Framework

Language: Go - Size: 1.17 MB - Last synced at: 5 days ago - Pushed at: 5 days ago - Stars: 392 - Forks: 41

Katirinata/CMD-Exploit-CVE-2024-RCE-AboRady-FUD-25765-Injection

Exploit development uses tools like exploitation frameworks and CVE databases. Cmd exploits, such as cmd fud or cmd exploit, enable silent execution while avoiding detection through proper setups.

Language: Visual Basic .NET - Size: 706 KB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 1 - Forks: 0

sonne988/DonPwner

πŸ” Analyze and optimize passwords with DonPwner, an advanced tool for credential analysis and password spraying using DonPAPI.

Language: Python - Size: 1.41 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 2 - Forks: 0

pwndbg/pwndbg

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Language: Python - Size: 103 MB - Last synced at: 6 days ago - Pushed at: 6 days ago - Stars: 9,689 - Forks: 1,135

gustavo-grieco/quimera

Data-driven exploit generation for Ethereum smart contracts using LLMs and Foundry

Language: Python - Size: 231 KB - Last synced at: 6 days ago - Pushed at: 9 days ago - Stars: 81 - Forks: 15

x64dbg/x64dbg

An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.

Language: C++ - Size: 59.8 MB - Last synced at: 8 days ago - Pushed at: 9 days ago - Stars: 47,286 - Forks: 2,630

Apohub55/Slient-URL-Exploit

πŸ›‘οΈ Expose and analyze hidden URL exploits that enable undetected downloads and drive-by installations of malicious software during online activities.

Language: C# - Size: 1.01 MB - Last synced at: 8 days ago - Pushed at: 8 days ago - Stars: 0 - Forks: 0

cybersecurity-dev/awesome-binary-exploitation

Awesome Binary Exploitation

Size: 17.6 KB - Last synced at: 7 days ago - Pushed at: 9 days ago - Stars: 1 - Forks: 0

g3rzi/awesome-security-research

😎 A curated list of the awesome resources about the security research

Size: 456 KB - Last synced at: 9 days ago - Pushed at: 9 days ago - Stars: 10 - Forks: 2

pwnfuzz/diffrays

DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and reverse engineering.

Language: Python - Size: 159 MB - Last synced at: 6 days ago - Pushed at: 9 days ago - Stars: 268 - Forks: 16

ferxxo2024/PenetrationSystem

πŸ”« Simulate realistic bullet penetration with advanced physics in Godot 4, using material properties for accurate damage calculation and optimized performance.

Language: GDScript - Size: 1.35 MB - Last synced at: 9 days ago - Pushed at: 9 days ago - Stars: 0 - Forks: 0

hacksysteam/HackSysExtremeVulnerableDriver

HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux

Language: C - Size: 1.8 MB - Last synced at: 8 days ago - Pushed at: 10 months ago - Stars: 2,897 - Forks: 574

sergey-pronin/Awesome-Vulnerability-Research

πŸ¦„ A curated list of the awesome resources about the Vulnerability Research

Size: 103 KB - Last synced at: 8 days ago - Pushed at: about 5 years ago - Stars: 1,284 - Forks: 165

The-Art-of-Hacking/h4cker

This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security, vulnerability research, exploit development, reverse engineering, and more. πŸ”₯ Also check: https://hackertraining.org

Language: Jupyter Notebook - Size: 140 MB - Last synced at: 12 days ago - Pushed at: 14 days ago - Stars: 24,206 - Forks: 4,611

yoavst/Heapsong

Heap visualizer for heap shaping

Language: TypeScript - Size: 763 KB - Last synced at: 13 days ago - Pushed at: 14 days ago - Stars: 0 - Forks: 0

Crypto-Cat/cryptocat-gitbook

Repository for my GitBook (CTF writeups / vuln research / bugbounty)

Language: Python - Size: 79.1 MB - Last synced at: 11 days ago - Pushed at: 14 days ago - Stars: 15 - Forks: 4

lexathegoat/AutomatedVulnerabilityChaining

An advanced penetration testing framework that automates the process of discovering and chaining vulnerabilities from reconnaissance to exploitation.

Language: Python - Size: 69.3 KB - Last synced at: 13 days ago - Pushed at: 16 days ago - Stars: 0 - Forks: 0

Chococolita/PDF-FUD-Exploit

A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates

Language: C++ - Size: 136 KB - Last synced at: 21 days ago - Pushed at: 21 days ago - Stars: 0 - Forks: 0

Chococolita/HTA-Exploit

Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution

Language: C# - Size: 118 KB - Last synced at: 21 days ago - Pushed at: 21 days ago - Stars: 0 - Forks: 0

Chococolita/Discord-Image-Logger-Stealer

Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token

Language: C# - Size: 149 KB - Last synced at: 21 days ago - Pushed at: 21 days ago - Stars: 0 - Forks: 0

Chococolita/Slient-URL-Exploit

URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.

Language: C# - Size: 896 KB - Last synced at: 21 days ago - Pushed at: 21 days ago - Stars: 0 - Forks: 0

tattoosonmyskin/time-warp-exploit-white-paper

this is a discovery i made and reported through the proper security channels.

Size: 34.2 KB - Last synced at: 10 days ago - Pushed at: 12 days ago - Stars: 2 - Forks: 0

TheMalwareGuardian/Exploit-the-Binary

How to get started in the world of binary exploitation.

Language: Python - Size: 132 MB - Last synced at: 25 days ago - Pushed at: 25 days ago - Stars: 4 - Forks: 2

vatsalgupta67/All-In-One-CyberSecurity-Resources

List of CyberSecurity Resources and some different Sub-Domains of CyberSecurity

Size: 186 KB - Last synced at: 14 days ago - Pushed at: over 1 year ago - Stars: 503 - Forks: 64

Spynetics/SpiWare

Language: Luau - Size: 2.77 MB - Last synced at: 26 days ago - Pushed at: 26 days ago - Stars: 2 - Forks: 0

CJSKWT/PDF-FUD-Exploit

A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates

Language: C++ - Size: 432 KB - Last synced at: 29 days ago - Pushed at: 29 days ago - Stars: 0 - Forks: 0

CJSKWT/HTA-Exploit

Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution

Language: C# - Size: 334 KB - Last synced at: 29 days ago - Pushed at: 29 days ago - Stars: 0 - Forks: 0

CJSKWT/Discord-Image-Logger-Stealer

Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token

Language: C# - Size: 461 KB - Last synced at: 29 days ago - Pushed at: 29 days ago - Stars: 0 - Forks: 0

CJSKWT/Slient-URL-Exploit

URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.

Language: C# - Size: 1.07 MB - Last synced at: 29 days ago - Pushed at: 29 days ago - Stars: 0 - Forks: 0

wanzzz894/Deface-TOOLS-

😈 DEVIL DEFACER v3.0 πŸ”₯ Tools deface paling ganas bangsat! Auto scan SQLi/XSS/LFI, mass attack ratusan website sekaligus kontol! Multi-threading 10x lebih cepat, akurasi 99.8% goblok! Buat lu yang mau jadi legend defacer, ini senjata setannya anjing! Black hat weapon extreme, tanggung jawab sendiri ngentot! πŸ˜ˆπŸ’€

Language: Python - Size: 16.6 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

SwezyDev/RAT-Vulnerabilities

A collection of exploit examples and PoCs inspired by vulnerabilities seen in RATs, for educational reverse‑engineering and exploit development.

Language: Python - Size: 85.9 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 6 - Forks: 0

Rug4lo/Exploiting-Resources

A repository with a bunch of resources for learning exploiting in Windows (pwn in Windows)

Size: 7.81 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 1 - Forks: 0

x86byte/RE-MA-Roadmap

Reverse Engineering and Malware Analysis Roadmap

Size: 127 MB - Last synced at: about 1 month ago - Pushed at: 2 months ago - Stars: 474 - Forks: 65

TheHashCode/Roblox-Moon

πŸŒ• Execute custom Executors with Roblox Moon and enhance your gameplay experience in the Roblox universe effortlessly.

Language: C# - Size: 1.29 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

AmirRajabi-web-developer/PrivEscScope

πŸ” Discover privilege escalation paths in your environment with PrivEscScope, simplifying security assessments and boosting your defense strategies.

Language: C# - Size: 1.29 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

exploreserengeti/PrivEscScope

πŸ” Explore and analyze privilege escalation paths in environments to enhance security and minimize risks.

Language: Python - Size: 1.29 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

IamVanLord/NSecSoftBYOVD

πŸ› οΈ Terminate AV processes easily with NSecSoftBYOVD using the provided driver for streamlined execution in your environment.

Size: 1.31 MB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

hugsy/gef

GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux

Language: Python - Size: 7.1 MB - Last synced at: about 2 months ago - Pushed at: 3 months ago - Stars: 7,819 - Forks: 790

rafainsights/Croqueta

AI-powered reverse engineering assistant for Ghidra. Uses Claude, Groq, OpenAI, Gemini, or Ollama to provide intelligent suggestions for function/variable renaming, type inference, code explanations, comments, and original code rewriting.

Language: Python - Size: 2.73 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

Tarimaow/Anydesk-Exploit-CVE-2025-12654-RCE-Builder

Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.

Language: Visual Basic .NET - Size: 46.9 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Kartiowmn/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce

Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.

Language: Visual Basic .NET - Size: 17.3 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Kartiowmn/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud

Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.

Language: Visual Basic .NET - Size: 12.9 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Kartiowmn/Phantom-Registy-Exploit-Cve2025-20682-Runtime-Fud-Lnk

Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.

Language: Visual Basic .NET - Size: 13.5 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

labex-labs/kali-server-exploitation-in-action

This course covers penetration testing and ethical hacking with Kali Linux. Key topics include exploiting vulnerabilities via Metasploit, scanning and exploiting network services, brute-forcing remote access, developing custom scanners, attacking vulnerabilities like IngressLock, Samba, and Unreal IRCd, creating malicious PDFs, and privilege esc...

Size: 38.1 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

labex-labs/penetration-testing-for-beginners

Test your skills in this challenge-based course covering essential penetration testing techniques. Each challenge requires you to independently discover and exploit vulnerabilities using industry-standard tools like Nmap, FTP, SMB, Telnet, Rsync, RDP, HTTP, and SSH. Perfect your reconnaissance and enumeration skills through self-guided explorati...

Size: 39.1 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

labex-labs/metasploit-for-beginners

In this course, learn the fundamentals of using Metasploit, a powerful penetration testing framework. Explore installation, console navigation, module usage, scanning techniques, exploit execution, and post-exploitation.

Size: 35.2 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

mario7gs/vsftpd-exploit-test

- Educational pentest using Metasploit to exploit vsFTPd 2.3.4 backdoor vulnerability. Includes screenshots and network analysis.

Size: 293 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

thieveshkar/RootQuest-CTF-Box-Multi-Stage-Exploitation-VM

Custom vulnerable VM (Ubuntu 14.04) designed for teaching multi-stage penetration testing. Features 10 interconnected challenges across Forensics, Web Exploitation (SQLi, XSS), Cryptography, and Kernel Exploitation (OverlayFS/CVE-2015-1328) to achieve full root compromise.

Size: 22.5 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

watmeom/HTA-Exploit

Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution

Language: C# - Size: 119 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

watmeom/Slient-URL-Exploit

URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.

Language: C# - Size: 909 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

watmeom/PDF-FUD-Exploit

A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates

Language: C++ - Size: 142 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

watmeom/Discord-Image-Logger-Stealer

Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token

Language: C# - Size: 150 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Think-Cube/Metasploit-Cheat-Sheet

Metasploit Cheat Sheet β€” up-to-date quick reference for msfconsole, msfvenom & Meterpreter.

Size: 5.86 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Lakiya673/CVE-2025-5777

πŸ› οΈ Explore the CVE-2025-5777 memory leak vulnerability in Citrix NetScaler, illustrating the risks of uninitialized memory in parsing malformed POST data.

Language: Python - Size: 1.3 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 2 - Forks: 0

aniket2912/Internal-Network-Penetration-testing

πŸ”’ Internal Network Penetration Testing – A complete module covering methodologies, attack vectors, tools, and hands-on labs to assess and exploit security weaknesses within internal networks.

Size: 17.1 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

decal/werdlists

:keyboard: Wordlists, Dictionaries and Other Data Sets for Writing Software Security Test Cases

Language: HTML - Size: 467 MB - Last synced at: about 1 month ago - Pushed at: over 1 year ago - Stars: 359 - Forks: 94

pablo388/WinRAR-CVE-2025-8088-PoC-RAR

🚨 Exploit WinRAR CVE-2025-8088 with this PoC RAR archive, demonstrating the vulnerability and its impact when executed on the affected software.

Size: 1.3 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Sh3ruman/CVE-2025-55188-7z-exploit

⚠️ Demonstrate CVE-2025-55188 with this proof-of-concept exploit for 7-Zip, revealing vulnerabilities in file extraction handling and potential impacts.

Language: Shell - Size: 1.29 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 1 - Forks: 0

ukisshinaah/CVE-2025-48799

πŸ›‘οΈ Demonstrate CVE-2025-48799, a Windows Update service vulnerability that allows elevation of privilege via arbitrary folder deletion on multi-drive systems.

Language: C++ - Size: 1.57 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

pradip022/CVE-2025-21333-POC

πŸ› οΈ Exploit CVE-2025-21333 in vkrnlintvsp.sys with this proof of concept, aimed at demonstrating potential threats on Windows 11 systems.

Language: C++ - Size: 1.31 MB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

BlackSnufkin/BYOVD

BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).

Language: Rust - Size: 439 KB - Last synced at: 2 months ago - Pushed at: 3 months ago - Stars: 392 - Forks: 63

ttwizz/Open-Aimbot πŸ“¦

✨Universal Aim Assist Framework✨

Language: Lua - Size: 2.21 MB - Last synced at: 2 months ago - Pushed at: about 1 year ago - Stars: 37 - Forks: 34

TheStingR/MCP-Ghidra5

🎯 Advanced GPT-5 Powered Ghidra Reverse Engineering MCP Server | 7 AI-Enhanced Analysis Tools | Professional Binary Analysis | TechSquad Inc. Proprietary Software

Language: Python - Size: 610 KB - Last synced at: about 2 months ago - Pushed at: 3 months ago - Stars: 4 - Forks: 1

HyggeHalcyon/CTFs

CTFs solve scripts

Language: Python - Size: 406 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 16 - Forks: 0

HuskyHacks/ShadowSteal

Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation

Language: Nim - Size: 300 KB - Last synced at: about 2 months ago - Pushed at: almost 4 years ago - Stars: 213 - Forks: 37

Kaswwom/PDF-FUD-Exploit

A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates

Language: C++ - Size: 181 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Kaswwom/Discord-Image-Logger-Stealer

Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token

Language: C# - Size: 149 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Kaswwom/Slient-URL-Exploit

URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.

Language: C# - Size: 895 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Kaswwom/HTA-Exploit

Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution

Language: C# - Size: 117 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

S4CH/s4ch.github.io

Another random blog about security

Language: HTML - Size: 403 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 9 - Forks: 2

Wamtoewkz/CMD-Exploit-CVE-2024-RCE-AboRady-FUD-25765-Injection

Exploit development uses tools like exploitation frameworks and CVE databases. Cmd exploits, such as cmd fud or cmd exploit, enable silent execution while avoiding detection through proper setups.

Language: Visual Basic .NET - Size: 213 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Maskokz/PDF-FUD-Exploit

A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates

Language: C++ - Size: 183 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Maskokz/Slient-URL-Exploit

URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.

Language: C# - Size: 896 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Maskokz/HTA-Exploit

Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution

Language: C# - Size: 119 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Maskokz/Discord-Image-Logger-Stealer

Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token

Language: C# - Size: 149 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

PardhuSreeRushiVarma20060119/Exploit-Engineering

Welcome to the definitive record of my journey into x86-64 Assembly Language, System-Level Programming, Reverse Engineering, and Exploit Development.

Language: C - Size: 455 KB - Last synced at: about 1 month ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Related Keywords
exploit 254 exploitation 207 exploitation-framework 183 cve 177 exploit-code 154 exploit-database 148 cve-scanning 148 slient-exploit-builder 147 exploit-exercises 145 exploit-kit 145 cve-2021-44228 109 slient-exploit 108 slient-url-exploit 104 slient-pdf-exploit 101 slient-jpg-exploit 99 slient-doc-exploit 97 slient-png-exploit 92 slient-hta-exploit 91 reverse-engineering 79 penetration-testing 71 cybersecurity 59 exploits 55 security 47 python 41 cve-2025-44228 38 shellcode 37 hacking 36 malware-analysis 35 ethical-hacking 35 security-tools 32 exploiting 28 ctf 28 linux 27 hacking-tools 26 roblox-hack 26 security-research 26 binary-exploitation 25 vulnerability-research 25 roblox-lua 24 buffer-overflow 24 robloxlua 24 roblox-exploiting 24 windows 24 vulnerability-assessment 23 vulnerability 23 rlua 22 network-security 21 roblox 21 threat-hunting 20 roblox-script 20 offensive-security 20 byfron 17 assembly 16 cve-search 16 pwn 15 red-team 15 pentesting 15 privilege-escalation 15 metasploit 15 synapse-x-free 14 roblox-synapse-x-free 14 roblox-dev 14 executor-roblox-download 14 executor-roblox 14 cyber-security 13 cvent-sast 13 infosec 13 pdf-exploit 13 shellcode-development 13 rop 13 python3 13 debugging 12 anydesk-setup 12 gdb 12 0day 12 anydesk-port 12 anydesk-password 12 hacking-tool 12 hacktoberfest 12 anydesk-exploit 12 winrar 12 rce-exploit 12 anydesk-download 12 pdf 12 information-security 12 anydesk 12 c 12 open-source 11 incident-response 11 archive 11 aslr-bypass 11 0day-exploit 10 pdf-format 10 zero-day-exploit 10 winrar-exploit 10 0day-exploits 10 0day-2024 10 zeroday-attack 10 red-teaming 10 fuzzing 10