The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
-
Updated
Jun 6, 2024 - C#
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
Community curated list of templates for the nuclei engine to find security vulnerabilities.
A Go-based Exploit Framework
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
RevEng.AI Toolkit and Python API
RevEng.AI IDA Pro Plugin
GEP (GDB Enhanced Prompt) - a GDB plug-in for GDB command prompt with fzf history search, fish-like autosuggestions, tab auto-completion with fzf, and more!
List of CyberSecurity Resources and some different Sub-Domains of CyberSecurity
An open-source user mode debugger for Windows. Optimized for reverse engineering and malware analysis.
Universal Open Source Aimbot
Cyber lab to explore different memory exploits and to analyze malware
RevEng.AI Ghidra Plugin
This repository contains multiple exploits I have written for various CVEs and CTFs
This repository contains a collection of tools, scripts, and resources for ethical hacking and penetration testing. It is designed to help security professionals and enthusiasts to identify and mitigate vulnerabilities in various systems, networks, and applications.Dive in and lets have some fun.
A symbolic execution engine for EVM smart contract binaries.
Add a description, image, and links to the exploit-development topic page so that developers can more easily learn about it.
To associate your repository with the exploit-development topic, visit your repo's landing page and select "manage topics."