#

exploits

Here are 452 public repositories matching this topic...

h4cker

This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), artificial intelligence security, vulnerability research, exploit development, reverse engineering, and more.

  • UpdatedJun 8, 2025
  • Jupyter Notebook
SUDO_KILLER

A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.

  • UpdatedJun 5, 2025
  • Shell

vulnx 🕷️ an intelligent Bot, Shell can achieve automatic injection, and help researchers detect security vulnerabilities CMS system. It can perform a quick CMS security detection, information collection (including sub-domain name, ip address, country information, organizational information and time zone, etc.) and vulnerability scanning.

  • UpdatedJun 7, 2023
  • Python

Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆项目,获取Nuclei POC,并将POC按类别分类存放,使用 Action实现。已有19w+POC,已校验格式的有效性并去重(验证的是格式的有效性)

  • UpdatedJun 10, 2025
  • Python

Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.

  • UpdatedJul 5, 2023
  • C++

Created by The cybersecurity community

Followers
321 followers
Wikipedia
Wikipedia

Related Topics

cybersecurity hacking penetration-testing vulnerability-assessment