Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.
-
Updated
Aug 10, 2023 - Python
Cross Site "Scripter" (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications.
A python based tool for exploiting and managing Android devices via ADB
A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩
Exploiting challenges in Linux and Windows
Framework for exploiting local vulnerabilities
C-shellcode to hex converter, handy tool for paste & execute shellcodes in IDA PRO, gdb, windbg, radare2, ollydbg, x64dbg, immunity debugger & 010 editor
Data+code for NFT launch guide blogpost.
Challenges and vulnerabilities exploitation.
Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs
With xshellex you can paste any kind of c-shellcode strings in x64dbg, ollydbg & immunity debugger
A Roblox script that aims to accurately simulate the 2016 Roblox client.
Improper Authorization Vulnerability in Confluence Data Center and Server + bonus 🔥
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
Premium Roblox Script Hub
poxyran's blog
Universal Open Source Aimbot
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
Add a description, image, and links to the exploiting topic page so that developers can more easily learn about it.
To associate your repository with the exploiting topic, visit your repo's landing page and select "manage topics."