exploits
Exploit refers to a piece of code or technique that takes advantage of a security vulnerability in a system, application, or network to cause unintended behavior. Exploits can be used by attackers to gain unauthorized access, escalate privileges, execute arbitrary code, or cause a denial of service. This topic covers the various types of exploits, such as zero-day exploits, remote code execution, and privilege escalation. It also explores the lifecycle of an exploit, from discovery and development to deployment and mitigation, and highlights the importance of vulnerability management and patching in preventing exploits.
Here are 24 public repositories matching this topic...
Find exploits in local and online databases instantly ; Same as the original, but usable and constantly up-to-date
-
Updated
Oct 28, 2018 - Shell
Xsearch - a utility to search exploitdb for exploits and shellcodes.
-
Updated
Jan 6, 2022 - Shell
Find exploits in local and online databases instantly
-
Updated
Jun 26, 2018 - Shell
QuickScript to download exploits from exploitdb
-
Updated
Jan 3, 2021 - Shell
Collection of Linux PrivEsc Tools
-
Updated
Jan 6, 2023 - Shell
Security testing tool for Arch Linux
-
Updated
Nov 26, 2023 - Shell
Get latest Exploit Databases notification on your Desktop
-
Updated
Jan 29, 2020 - Shell
AutoKali automatically installs useful programs and scripts for recon, enumeration and exploitation for Kali Linux that aren't included by default, as well as essential programs for any Kali user.
-
Updated
Jul 20, 2023 - Shell
Automated privilege escalation of the world's most popular Docker images.
-
Updated
Sep 25, 2023 - Shell
CVE-2021-3560 Local PrivEsc Exploit
-
Updated
Jun 12, 2021 - Shell
Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.
-
Updated
Apr 21, 2023 - Shell
HTTP3-attacks (CVE-2022-30592)
-
Updated
Dec 18, 2022 - Shell
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
-
Updated
Nov 29, 2023 - Shell
This custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
-
Updated
Mar 5, 2022 - Shell
Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)
-
Updated
Dec 28, 2023 - Shell
Created by The cybersecurity community
- Followers
- 269 followers
- Wikipedia
- Wikipedia