All releases of the security research group (a.k.a. hackers) The Hacker's Choice
-
Updated
Jun 12, 2023 - HTML
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Repository for information about 0-days exploited in-the-wild.
A Web Vulnerability Scanner and Patcher
Some Generic Browser Exploits (For Educational Purposes Only)
PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282
Exploits for some of the vulnerabilities I have discovered
This repository contains exploits to Windows binaries provided by Exploit2 course by opensecuritytraining.
A personal website containting usage syntax for various popular tools and information related to ethical hacking and pentesting.
A program that stops the lanschool and lanschool air program from starting
Just H4 and L0 publishing write ups of hacking CTFs and challenges
Created by The cybersecurity community