Universal Open Source Aimbot
-
Updated
May 30, 2024 - Lua
Universal Open Source Aimbot
A list of Capture The Flag (CTF) frameworks, libraries, resources and software for started/experienced CTF players 🚩
Nanocore Internal UI
I suck at scripting.
Premium Roblox Script Hub
Read text section bytes and format it for shellcode (64bit ELF only)
Writeups and solve scripts for IRIS CTF 2024 (Capture the flag challenges)
Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs
Borpheus Is A Multi Cyber-Security Tool (Scanning, Payload Building, Exploiting).
Read text section bytes and format it for shellcode. based on trimscash/texthex
👻 SYSTEMatic: Systematically Seizing SYSTEM Rights. Token Impersonation POC. Alternative to PSExec for token theft. From Administrator to NT Authority\SYSTEM.
Framework for exploiting local vulnerabilities
Improper Authorization Vulnerability in Confluence Data Center and Server + bonus 🔥
AUXT (Advanced USB Exploitation Toolkit) is a USB exploitation tool that you can use to exploit connected USB devices to your computer (as well as to control and manage)
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
Add a description, image, and links to the exploiting topic page so that developers can more easily learn about it.
To associate your repository with the exploiting topic, visit your repo's landing page and select "manage topics."