Topic: "exploit-database"
rfunix/Pompem
Find exploit tool
Language: Python - Size: 391 KB - Last synced at: about 2 months ago - Pushed at: almost 3 years ago - Stars: 1,009 - Forks: 272

Qftm/Information_Collection_Handbook
Handbook of information collection for penetration testing and src
Size: 11.7 MB - Last synced at: 3 months ago - Pushed at: over 2 years ago - Stars: 810 - Forks: 155

EntySec/HatSploit
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Language: Python - Size: 8.2 MB - Last synced at: about 1 month ago - Pushed at: 7 months ago - Stars: 303 - Forks: 67

jollheef/lpe
collection of verified Linux kernel exploits
Language: C - Size: 49.8 KB - Last synced at: 3 months ago - Pushed at: over 4 years ago - Stars: 187 - Forks: 21

andreafioraldi/cve_searchsploit
Search an exploit in the local exploitdb database by its CVE
Language: Python - Size: 1.89 MB - Last synced at: about 1 month ago - Pushed at: over 2 years ago - Stars: 172 - Forks: 49

TuuuNya/WebPocket
Exploit management framework
Language: Python - Size: 178 KB - Last synced at: 27 days ago - Pushed at: about 2 years ago - Stars: 152 - Forks: 28

mufeedvh/CVE-2019-8449
CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4
Language: Python - Size: 6.84 KB - Last synced at: 8 days ago - Pushed at: over 5 years ago - Stars: 67 - Forks: 20

kylekirkby/Python-Exploit-Search-Tool
A search tool that searches Offensive Securitys Exploit-db and Shodans Exploit DB using their API.
Language: C - Size: 31.4 MB - Last synced at: 3 months ago - Pushed at: about 11 years ago - Stars: 40 - Forks: 26

gusboycharxb93/SetApprovalForAll_Drainer
🔥 Best Drainer on the market right now updates every week 🔥 Drains Native coin, NFT, Tokens. ⭐STABLE OPERATION IS GUARANTEED⭐
Size: 8.79 KB - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 31 - Forks: 0

ronin-rb/ronin-app
A local web interface for Ronin.
Language: Ruby - Size: 412 KB - Last synced at: 3 days ago - Pushed at: 2 months ago - Stars: 26 - Forks: 8

sectool/Python-Metasploit-Framework-Database-Management
Python - Metasploit-Framework Database Management
Language: Python - Size: 11.7 KB - Last synced at: 2 months ago - Pushed at: about 5 years ago - Stars: 15 - Forks: 11

alikaratana/Google-Hacking-Tool
A java based google hacking tool that allows to do advanced search on google, also to search in google hacking database and exploit database..
Language: Java - Size: 552 KB - Last synced at: over 2 years ago - Pushed at: over 8 years ago - Stars: 15 - Forks: 2

MrSentex/0day.today-API
Unofficial API for 0day.today database | Supported languages: Python and PHP
Language: PHP - Size: 17 MB - Last synced at: about 1 year ago - Pushed at: over 5 years ago - Stars: 13 - Forks: 8

exploit-labs/huawei_hg255s_exploit
🚀 Server Directory Traversal at Huawei HG255s ☄️ - CVE-2017-17309 🚀
Language: Python - Size: 20.5 KB - Last synced at: over 2 years ago - Pushed at: about 5 years ago - Stars: 12 - Forks: 7

Caztemaz/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.
Language: Visual Basic .NET - Size: 18.3 MB - Last synced at: 1 day ago - Pushed at: 1 day ago - Stars: 10 - Forks: 2

Yuweixn/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
Language: Visual Basic .NET - Size: 113 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 7 - Forks: 3

ThoristKaw/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
Language: Visual Basic .NET - Size: 208 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 7 - Forks: 1

Conradoduart3/Slient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve
Vulnerability Disclosure Timeline Closer inspection of the Exploit PDF content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit PDF from Python encrypted code content which we also implement in couple of our builders.
Language: C++ - Size: 674 KB - Last synced at: about 2 years ago - Pushed at: over 2 years ago - Stars: 6 - Forks: 7

rad10/SearchSploit.py
Independant repo to my fork of exploitdb
Language: Python - Size: 198 KB - Last synced at: over 2 years ago - Pushed at: almost 5 years ago - Stars: 6 - Forks: 2

pbnj/exploitalert-cli 📦
A CLI for Exploitalert
Language: JavaScript - Size: 4.63 MB - Last synced at: 18 days ago - Pushed at: over 7 years ago - Stars: 6 - Forks: 0

plasticuproject/rest
A tool to remotely scan Linux system packages via SSH
Language: Shell - Size: 2.7 MB - Last synced at: over 2 years ago - Pushed at: over 4 years ago - Stars: 5 - Forks: 1

sepehrdaddev/lsd-pl-exploits
Language: C - Size: 243 KB - Last synced at: about 1 year ago - Pushed at: about 5 years ago - Stars: 4 - Forks: 1

pbnj/exploitalert 📦
A Node-based Exploitalert API
Language: JavaScript - Size: 37.1 KB - Last synced at: 9 days ago - Pushed at: over 7 years ago - Stars: 4 - Forks: 1

yaph/exploit-db-archive
Script to process data from the Exploit database for later visualization with D3
Language: Python - Size: 125 KB - Last synced at: 3 months ago - Pushed at: almost 11 years ago - Stars: 4 - Forks: 4

open-crs/dataset
Module for compiling and managing vulnerable programs 🗂️
Language: Python - Size: 137 KB - Last synced at: 7 days ago - Pushed at: 6 months ago - Stars: 3 - Forks: 2

sepehrdaddev/m00-exploits
Language: C - Size: 1.5 MB - Last synced at: about 1 year ago - Pushed at: about 5 years ago - Stars: 3 - Forks: 0

USDTC/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Language: C++ - Size: 976 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 2 - Forks: 0

yammydonats/doc-exploit
Size: 1000 Bytes - Last synced at: almost 2 years ago - Pushed at: almost 2 years ago - Stars: 2 - Forks: 0

Caztemaz/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.
Language: Visual Basic .NET - Size: 13.9 MB - Last synced at: 1 day ago - Pushed at: 1 day ago - Stars: 1 - Forks: 2

Caztemaz/Phantom-Registy-Exploit-Cve2025-20682-Runtime-Fud-Lnk
Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.
Language: Visual Basic .NET - Size: 12.9 MB - Last synced at: 1 day ago - Pushed at: 1 day ago - Stars: 1 - Forks: 0

Shreyashis15/exploitdb
Explore vulnerabilities with the lightweight Java CLI tool, ExploitDB. This tool simplifies the process of scraping and exporting data from Exploit-DB, making it essential for security researchers and response teams. 🐙💻
Language: Java - Size: 921 KB - Last synced at: 13 days ago - Pushed at: 13 days ago - Stars: 1 - Forks: 1

meeow-r/PDF-EXPLOIT
Convert your executables into PDF files with embedded exploits that bypass email filters and execute your payload silently.
Size: 1.22 MB - Last synced at: 20 days ago - Pushed at: 20 days ago - Stars: 1 - Forks: 0

TypsSec/WinRAR-Exploit-Builder
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
Language: C# - Size: 288 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 1 - Forks: 0

USDTC/Slient-URL-Exploit
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Language: C# - Size: 1.4 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 1 - Forks: 0

Shriokes/WinRAR-Exploit-Builder
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
Language: C# - Size: 183 KB - Last synced at: 4 months ago - Pushed at: 4 months ago - Stars: 1 - Forks: 0

Part-s/WinRAR-Exploit-Builder
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
Language: C# - Size: 127 KB - Last synced at: 7 months ago - Pushed at: 7 months ago - Stars: 1 - Forks: 0

SamBodys/WinRAR-Exploit-Builder
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
Language: C# - Size: 150 KB - Last synced at: 8 months ago - Pushed at: 8 months ago - Stars: 1 - Forks: 0

00Romans00/WinRAR-Exploit-Builder
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
Language: C# - Size: 852 KB - Last synced at: 10 months ago - Pushed at: 10 months ago - Stars: 1 - Forks: 0

CarsPound/Slient-PDF-FUD-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Language: C++ - Size: 1020 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 1 - Forks: 0

twseptian/hprmsv1.0-sql-injection-authenticated
Hospital's Patient Records Management System v1.0 - 'id' SQL Injection (Authenticated)
Size: 1.95 KB - Last synced at: about 2 months ago - Pushed at: over 3 years ago - Stars: 1 - Forks: 0

Z9ine4x/CVE-Searcher
CVE-Searcher is a simple Python CLI tool that quickly fetches CVE information from trusted sources. With this tool, you can easily access critical vulnerability data and related resources. 🐙✨
Language: Python - Size: 11.7 KB - Last synced at: about 19 hours ago - Pushed at: about 21 hours ago - Stars: 0 - Forks: 0

Geinasz/CMD-Exploit-CVE-2024-RCE-AboRady-FUD-25765-Injection
Exploit development uses tools like exploitation frameworks and CVE databases. Cmd exploits, such as cmd fud or cmd exploit, enable silent execution while avoiding detection through proper setups.
Language: Visual Basic .NET - Size: 1020 KB - Last synced at: 1 day ago - Pushed at: 1 day ago - Stars: 0 - Forks: 0

Taowmz/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
Language: Visual Basic .NET - Size: 41 KB - Last synced at: 12 days ago - Pushed at: 13 days ago - Stars: 0 - Forks: 0

Trerims/WinRAR-Exploit-Builder
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
Language: C# - Size: 562 KB - Last synced at: 17 days ago - Pushed at: 17 days ago - Stars: 0 - Forks: 0

RaizCorp/Discord-Image-Logger-Stealer
Discord Image Logger captures images shared in Discord channels. This project serves as a learning tool for developers interested in understanding how to work with Discord's API. 🐙💻
Language: C# - Size: 181 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Ulvexon/HTA-Exploit
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Language: C# - Size: 105 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Quelvara/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
Language: Visual Basic .NET - Size: 49.8 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Ulvexon/PDF-FUD-Exploit
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Language: C++ - Size: 203 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Jinkoraa/Discord-Image-Logger-Stealer
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
Language: C# - Size: 150 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Jinkoraa/Slient-URL-Exploit
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Language: C# - Size: 895 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

hotparthi/CMD-Exploit-CVE-2024-RCE-AboRady-FUD-25765-Injection
Exploit development uses tools like exploitation frameworks and CVE databases. Cmd exploits, such as cmd fud or cmd exploit, enable silent execution while avoiding detection through proper setups.
Language: Visual Basic .NET - Size: 59.6 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Laertharaz/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
Language: Visual Basic .NET - Size: 40 KB - Last synced at: about 1 month ago - Pushed at: about 1 month ago - Stars: 0 - Forks: 0

Headcorvo/HTA-Exploit
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Language: C# - Size: 119 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Janenema/PDF-FUD-Exploit
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Language: C++ - Size: 178 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Janenema/HTA-Exploit
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Language: C# - Size: 111 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Janenema/Slient-URL-Exploit
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Language: C# - Size: 891 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Janenema/Discord-Image-Logger-Stealer
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
Language: C# - Size: 144 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Taonauz/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
Language: Visual Basic .NET - Size: 40 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Yuikiowz/Slient-URL-Exploit
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Language: C# - Size: 888 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Yuikiowz/PDF-FUD-Exploit
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Language: C++ - Size: 175 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Yuikiowz/HTA-Exploit
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Language: C# - Size: 107 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Yuikiowz/Discord-Image-Logger-Stealer
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
Language: C# - Size: 140 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Cazertm/HTA-Exploit
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Language: C# - Size: 107 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Cazertm/Discord-Image-Logger-Stealer
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
Language: C# - Size: 140 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Cazertm/Slient-URL-Exploit
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Language: C# - Size: 888 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Cazertm/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Language: C++ - Size: 450 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Cazertm/PDF-FUD-Exploit
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Language: C++ - Size: 196 KB - Last synced at: about 2 months ago - Pushed at: about 2 months ago - Stars: 0 - Forks: 0

Subha-coder-hash/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
Language: Visual Basic .NET - Size: 44.9 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

KrweKing/Discord-Image-Logger-Stealer
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
Language: C# - Size: 139 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

KrweKing/Slient-URL-Exploit
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Language: C# - Size: 887 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

KrweKing/HTA-Exploit
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Language: C# - Size: 107 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

KrweKing/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Language: C++ - Size: 432 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

KrweKing/PDF-FUD-Exploit
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Language: C++ - Size: 175 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Kramozon/Phantom-Registy-Exploit-Cve2025-20682-Runtime-Fud-Lnk
Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.
Language: Visual Basic .NET - Size: 13.5 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Kramozon/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.
Language: Visual Basic .NET - Size: 0 Bytes - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Kramozon/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.
Language: Visual Basic .NET - Size: 17.3 MB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

CryManxz/CMD-Exploit-CVE-2024-RCE-AboRady-FUD-25765-Injection
Exploit development uses tools like exploitation frameworks and CVE databases. Cmd exploits, such as cmd fud or cmd exploit, enable silent execution while avoiding detection through proper setups.
Language: Visual Basic .NET - Size: 69.3 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

ThreeMens/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
Language: Visual Basic .NET - Size: 36.1 KB - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Lalionsk/WinRAR-Exploit-Builder
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
Language: C# - Size: 0 Bytes - Last synced at: 2 months ago - Pushed at: 2 months ago - Stars: 0 - Forks: 0

Karitosmuan/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud
Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.
Language: Visual Basic .NET - Size: 13 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Kariaoston/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.
Language: Visual Basic .NET - Size: 17.4 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

SetKursma/Phantom-Registy-Exploit-CVE2025-20682-Runtime-FUD-LNK
Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.
Language: Visual Basic .NET - Size: 12.3 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Fhrioton/Cmd-Exploit-Cve-2025-Rce-AboRady-Fud-Injection
Exploit development uses tools like exploitation frameworks and CVE databases. Cmd exploits, such as cmd fud or cmd exploit, enable silent execution while avoiding detection through proper setups.
Language: Visual Basic .NET - Size: 201 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

housam123456789/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce
Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.
Language: Visual Basic .NET - Size: 16.8 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Yhael028373/Phantom-Registy-Exploit-CVE2025-20682-Runtime-FUD-LNK
Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.
Language: Visual Basic .NET - Size: 11.6 MB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Haristsj/Cmd-Exploit-Cve-2025-Rce-AboRady-Fud-Injection
Exploit development uses tools like exploitation frameworks and CVE databases. Cmd exploits, such as cmd fud or cmd exploit, enable silent execution while avoiding detection through proper setups.
Language: Visual Basic .NET - Size: 93.8 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

USDTC/HTA-Exploit
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Language: C# - Size: 388 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

Kirbirls/Anydesk-Exploit-CVE-2025-12654-RCE-Builder
Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases list risks, while CVE-2025-44228 is an example of a flaw. AnyDesk exploits highlight security gaps.
Language: Visual Basic .NET - Size: 36.1 KB - Last synced at: 3 months ago - Pushed at: 3 months ago - Stars: 0 - Forks: 0

abelreqma/RaptorVingtDeux
RaptorVingtDeux automates network scanning with nmap, allowing customizable scans and port selection, and integrates Searchsploit to find known vulnerabilities for detected software versions.
Language: Shell - Size: 18.6 KB - Last synced at: about 1 month ago - Pushed at: 5 months ago - Stars: 0 - Forks: 0

Tud-Ra/WinRAR-Exploit-Builder
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
Language: C# - Size: 530 KB - Last synced at: 6 months ago - Pushed at: 6 months ago - Stars: 0 - Forks: 0

CarsPound/Discord-Image-Logger-Slient-Exploit-Builder-Grabber-Stealer
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
Language: C++ - Size: 877 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

CarsPound/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Language: C++ - Size: 1.08 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 1

CarsPound/Hta-Exploit-Builder-Slient-Builder-Exploit-Database-Cve-2023-Malware
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
Language: C# - Size: 2.41 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

CarsPound/Slient-Url-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Language: C# - Size: 2.27 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

woiz-FF/WinRAR-Exploit-Builder
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
Language: C# - Size: 259 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

GetCaption/Slient-PDF-FUD-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Language: C++ - Size: 421 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

GetCaption/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
Language: C++ - Size: 438 KB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

GetCaption/Slient-Url-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Language: C# - Size: 1.75 MB - Last synced at: about 1 year ago - Pushed at: about 1 year ago - Stars: 0 - Forks: 0

Soradotos/Discord-Image-Logger-Slient-Exploit-Builder-Grabber-Stealer
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
Language: C++ - Size: 463 KB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0

Soradotos/Slient-Url-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Language: C# - Size: 1.74 MB - Last synced at: over 1 year ago - Pushed at: over 1 year ago - Stars: 0 - Forks: 0
